=90a1, bcdDevice=1e.eb [ 291.723313][ T8121] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 291.743143][ T9433] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 291.755762][ T8121] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 291.772159][ T9433] usb 2-1: config 0 descriptor?? [ 291.937841][ T8121] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.40 [ 291.947389][ T8121] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 291.964698][ T8121] usb 1-1: Product: syz [ 291.978789][ T8121] usb 1-1: Manufacturer: syz [ 291.983439][ T8121] usb 1-1: SerialNumber: syz [ 292.220670][ T9183] usb 2-1: USB disconnect, device number 12 [ 292.237810][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 292.268046][ T8121] usbhid 1-1:1.0: can't add hid device: -22 [ 292.274336][ T8121] usbhid: probe of 1-1:1.0 failed with error -22 [ 292.298603][ T8121] usb 1-1: USB disconnect, device number 2 20:26:12 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:12 executing program 4: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="00001a000100010044000000ffffff7f6824", 0x12, 0x400}, {0x0, 0x0, 0x880}], 0x0, &(0x7f0000011700)) 20:26:12 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:12 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {0x0}}, 0x18) read$FUSE(r0, 0x0, 0x0) 20:26:12 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0xffffffff, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a1fdc08a"}, 0x0, 0x0, @planes=0x0}) 20:26:12 executing program 2: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x77359400}) [ 292.788557][T19453] misc userio: Invalid payload size [ 292.796779][T19452] Bad inode number on dev loop4: 1 is out of range [ 292.810749][T19452] MINIX-fs: get root inode failed [ 292.822024][T19456] isofs_fill_super: root inode is not a directory. Corrupted media? [ 293.029565][ T9183] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 293.067744][ T9003] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 293.319105][ T9183] usb 1-1: Using ep0 maxpacket: 16 [ 293.324264][ T9003] usb 2-1: Using ep0 maxpacket: 8 [ 293.458295][ T9003] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 293.466472][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 293.480019][ T9003] usb 2-1: config 0 has no interface number 0 [ 293.486187][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 293.496186][ T9003] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 293.509168][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 293.520535][ T9003] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 293.533187][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 293.543338][ T9003] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 293.557640][ T9003] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 293.567083][ T9003] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 293.576659][ T9003] usb 2-1: config 0 descriptor?? [ 293.727758][ T9183] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.40 [ 293.738067][ T9183] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 293.746470][ T9183] usb 1-1: Product: syz [ 293.752291][ T9183] usb 1-1: Manufacturer: syz [ 293.756955][ T9183] usb 1-1: SerialNumber: syz 20:26:13 executing program 0: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1e7d, 0x2cf6, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9}, {{}, [{}]}}}]}}]}}, 0x0) 20:26:13 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {0x0}}, 0x18) read$FUSE(r0, 0x0, 0x0) 20:26:13 executing program 4: syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f00000001c0)='\nK', 0x2, 0xfff}], 0x20808, &(0x7f00000006c0)) 20:26:13 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240), 0x0, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="586fd3962a8ebf82f5b9781ef3fd8d20", 0x10, r0) [ 294.044785][ T9183] usbhid 1-1:1.0: can't add hid device: -22 [ 294.058603][ T9183] usbhid: probe of 1-1:1.0 failed with error -22 [ 294.074387][T19493] misc userio: Invalid payload size [ 294.082218][T19494] isofs_fill_super: root inode is not a directory. Corrupted media? 20:26:14 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcsu\x00', 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcsu\x00', 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcsu\x00', 0x200000, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) pselect6(0x40, &(0x7f0000000840)={0x7f}, 0x0, 0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000940), 0x8}) [ 294.091590][ T9183] usb 1-1: USB disconnect, device number 3 [ 294.098104][T19495] encrypted_key: master key parameter '' is invalid [ 294.134001][ T9003] usb 2-1: USB disconnect, device number 13 [ 294.139981][ C0] xpad 2-1:0.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 294.139996][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:14 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:14 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {0x0}}, 0x18) read$FUSE(r0, 0x0, 0x0) 20:26:14 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240), 0x0, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:26:14 executing program 4: keyctl$link(0x1e, 0x0, 0x0) [ 294.547669][ T9183] usb 1-1: new high-speed USB device number 4 using dummy_hcd 20:26:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000080)='big_key\x00', 0x0, &(0x7f0000000180)="0137e6b1cf2efe088f933abf8905fb48862ae3c1514c4d66df1bbb684a8d644d178616f34b988daa7e1f32959c5179f6caa97d24c20dedc31892a73953f6c95bad9d7fcd412e56870f3e0f6fec53cdea179148735a077f85288f8d1ccecf64b3c3006093d59a9b5aeb76b664e65a544baa979c30fa3bd6777ee76112eaf238d4f825bc0841abcc798331be6b93a40f1ceab649fa5702a6a9b43a4ab3d7429f9e70702db7e5a91aad345ae518fc81497d9211bb811fcf030f34a5aa59ce0111614c66824c5a327224dde4a3265d6acbe7bc01c2840a4ab31933729ccfe521e13f4ebbd3cfdc5e0384a9ba38ff905b9aa407c27fbdffc18f02037524d401b53ccb3b56271014303e04796afc83df859d8b19f89959d4b8879a56572178aa8e71c3408c71806a4b413fdf09f70aa27ab089ffd84b25500e8e55bba589078fcb8350593f360fbbfbd5e123f8639756eb7d48ad53d77262b986938f9a8e1e77687c54685c03d178e881dbb99735a434b2b563d93f501c3efc0aa5d5c15e9364d312dc5e23e1c12f88c2dbd5ee5336d5bb1fcffa93669eac3b460c87c150eb52fb0c1cda2062daf0fbd42596f56ef7d7444c9fd92f49d20a921bf1ba73aaaaae4d69bc4f6bf5017b1d1fe904735746e5ee1ad43230d5cbc11b9c924ea63e4573397fd510a2da32bac777f9282766ec2365902a302e002196879ecb12a1ff0077ea36214af68ce47fc1f4a6a714a49787e495bf0513622d3c58af0dc491a2e2854421e4a0df854acf4fe4b670e7e17a43f51b4f46d7f2449cbe9f103a9c74c4d0508e14d2f74d63a0ba68394e535fb48949443bbc5a0a1b7d55aa074f6b9cb2afe3557e809405a7a161c11527c95a182373b1037e4b1e541ec54e60f674ff803299ffcdeaef339bb4cca789c40856fae5dec9dc86db48a4cf1d4cda6d7c27a72d9e16cd6c7a60a8cc03c3564a97313c3f1fe524ad2393bde16f80fdb523123dc73bf8109f3ac31f6da6ed066871d8900403991453ec9bef3c52959ed0658641381dc212f9ee3817768d9520c30d11d2e98256698c599d323561712c3472da3e2fc304009a5ee6e6cab035d326f7bafc82c067c8330677abb483d0284b526d72999946e226875fbd60af7d8df268b7ff4c502bdee562649094826918290db6c69c24356a0a19a7cea29f4348cb739b041f6af495d751b54c242fbc6baf7327606ac5158091e36a1e4cbc5923714bef7b384c6f6f7619edd96028fb186d484204a69537f18fefcc88a05f052e6aee7fa2fae223ffa6351584a94221622f4e0fe6c5682f221cbdeb049fa5fe6fd3d1147e92aae7c42144edc361539752f1d9b5a9a5bb734d80b0f50ba5634a3a95eac847ef7c9fd150f056011c784bc2c8c7043c6416e0f83835aecb78fe2d6a8d249c5bfc58edbda5608ce553bd9a1de114f964cdf59f3089ee338d2d09860721a36ab1837c62de30e430f178e5a2f046d0a2694aeb7db7342807f2c9d46dd59ca2985261b36d7812fc5221d9fc41cb3331ae2b39cc263b80bf951f570b7c913f90fada2c2c4f65990b3a3d56416b56eacb7312ef558c3f8c6336350e18d56380530baf4500851a94f411a776fcca1eb5142d75bf59300f4ffc63bd2944df6cff4ec385fac2e47dc8813368473f703fcadeb24ff289f7f6f6f498b53e127c70b68f0399300aa4ec7d27d9695949ac4edb6f83c361e828675927ec8e242369be1c4bf2d91c56bef1999e0513d1f4c341af956afae0ee4a89c1838b0bcec30110cb1ec1e91b2df366d481d97ee9c4d99be7b4cbc9fa13255a38060959e81614e4b413503883b3194c541dab15fcad073c2b33e031ed7b8c0218f3049d9766ec0b611e61a66ce400d0a4cf1844455e723e3a22e4d07024c567674a14c9af6e1d05d9450397ae8f36b2941df2ca80c837b0041ace299d302ce9c480f105ee8c15914ea5c7f6d3571ebf45030febb8de4121b5edc6a4488be2aca1f4b27156f389bc876c137ac5ea371572b48df840925c097ab61560aa2f2def967050d6078b873bb366e3d2bae71fce48ac40bde4fa7e2ce3ddf06d5f458a36cfe7452526b36c1d99cbeabb0fd0589f8146004cb7203bd7075f50996e53484de16527a573d7232d2f2e3865dd04edf0bed607354eef26305eda0587524b501023bf857823e734ac6dfb335d73e1d7479f25ca6aad7f6905be6abcf6f4f7009afd4929517847e79c27f47acfae8c4ddcf26ff52015e329b4d2665bc5bd4cdc3805529a904272c9ff62d77ee0285de16bc7f42f6786498bff19d2a9d08d4dc0bfa0c8aa1fd407d059536ecc51a5000e5ccef4716aeb917c5b62f00e12e2500e52e74df6d8bf26b3dec44e402858b504f5a9f4158b6e97bfbcee35984d46eb26b7d507d3e404bc249c997491418cf995c6fad1aea71872e172062779d3274626ab327fe14fd6ba5efe80ee8d356de45f1e2ae08ebb22f1d12131c740aa153fe0a79ce4042a91968c3b26cae44b5b52d111cf15cd6fe4e417ed0ce27d2aeed5fae4e4578b4648ca60dcbf61733591f737cd37fc29dec2cf35101bf1bf94469c48306e8bb4ef8d163e8551b043d84db2e99a39025dfa463c88963291ef5bbef8150f5f7e7ac3e317f3f4d3935077f3b1b3b0b9dfd083551c0eb1b42ea079f44eb71a72d04d187e9a2e40126a0a2d83a79a14dd4cdda7cddb43fb8c34a0b9cc32032750d29208d0d79cde7ac3967bf6e221b322ff913c373264ee00a81eb04c1e1c6b3fbdbdc5fa8b9d9802f1cd46dc7d9dbad5c7d154ad3c6d28b6679e2f72b9e35947ebd79c332d043017ce1d4c2a46056caf416a9a2d18db14eb4793d5c050910012dc52e5afacad598e454205954c55525c29dd44bdeea007f13b2b8f7b8941688120ecd5fa6c1fca53f0b437120da3429125157041c6f744baafcfd27a1b2d06b57d224f912fedcfdb06adce659e3cc9776fd86c0fc9ed45e5a249b12c9500cbff60a8d0d26969b8c46af7cc60ace9d4e567b4c8b30a4752cfd91ba3c343c1d6703f57f46b8ac97bade78c145acb9556403d3bfa98e7a0ecaace60fe248441975e069e56eeb5786aef07034e461a0ef69645f3a8ecfa8c6e44d68954c7d31b2705bc90d4af0032c6c67f89470e2e89e4606f25440e858ab66babc25a949c3d3e837fe7a65b7d95c19782b8442f8116b24eb856c22eaf89662026e0ff9d3998edb9a61a29c1e1f6a0632c6feb8ac5453af52868c07c6f699c8e279289f1bb042b5a2f0ee100e18a397b837db88910503c392fc70548dcdf26f1cdc3db7d39b9d6c27374eb2a9fc4783247e53db7da3a57e74439454063511f971cb1c20e4646d8ae7b9969039c041310c9eda504fda6cfe0cdd08db4e957769a4295e5a15a91cd2c71adfc9313e607b4420eac9afa11f9d39a1d1ac3a19ae46d6c7cd2b0a3fc04e1f52cc911d66df19deea6adb10e1e7b9abb01e492774babfcde62c2475b296e741008d7bfdfee5f02944d7c057a84d506d640e6f0bdb2e6f466f87d96c548fcb4ad88a3df3dc69c2075d945012eb11a8b6127b5829f7921f5373c857633a86785e0c0269aca8d042ab7a1d7e1bfecbaed4ae2515c25d0f74881ddbc09a73185f7b3ed624c19086b8d5b6d6f068f76d9f32c83bc1d6e0a41a01ab2f0726d6a972811ccfa324d0df6f40e19ee2283a668172c0da20306b4b0bfc61ca68d49db4c343a29e8f1eebce064d922460f6499a2028cc05758a3a3f64f3b59682e456527efcda3cbf9d4b3ab674e79a7f3459d22f341e1eec28a57a0b7841589c8c701c776f6e9af49b07176eb1a3ae270ed6d7373ba613c92ff1c5293e79fd343b1d91edc438bd34dfc2f1015f4abc26e302f0ed529d9bbe10732bd381e3710c0c751f4145ecaac71b9395fce817b53492c1b8939efa8208b7f2a716b8174fdca43c60f2129b7166afa0a6828f886829f84293eac7889ad202639d2dab40c68aafce6f2777e1f91528eec9676d1c9ebeb938b91f51cf8fbe7d6d073174fb6010b43cef959dad2df3ab22fa1c3595ee171881fb94f7ed3faaabcb42e1cd50db727ba705f0f3156ce84f9a617dd2fb1a76bd283d0759cfaa6585a8a4b07f7621402138ff3d2116ec039e2dc1f7accf4e3797e829f57b7d2eba7d8faa5782a2af7e0ac1b5f95682c0b8e87038ae89cc1cd63021fe90baf3b2a139acf08939cdc4928b7c51cef0d2464d897122c1c808da3d0e981b9ecacd040bda572c952aad94d1dfffe5c8083256ccfc80ee70047cad20bd2c1258e32788e4e0c9ea6cb4a532cf74530fd7e66b9baf6f871c75f112f250ce8be61ca220d498db6a507468bbacdddc9f29e4fb550488c0f863c67283111e32ed2ecc8b8650f4f0475e1fd6e4f5fb0348f403f7dc0d739ae73f1e9f095b730bc5d595a8090547fb3d424d800dfd41519efa59a10a46ec538c0dee5bdacef7613755eaaf182b2f455f0ee99baecba4f9c587b8362fe46c061c618a6746669a378ed821f55cd8c2e43247d392cbc6651e315aab023b10538b4cfefb392184c7a8615338ca30a30124338c25004424e163e4f532334982d19cf7a34e2b5e3ecadc159c8a9af647c087c8e616876e9bbe9361171868f77ca147150d917cc51cd93bb21f19d6171e8f72669c56b16d193990c99371b78e1c23fbf838ac1062dc41965b9a3b8e0a24bb9124b05affee572d7e5079ba455f65b45bdc7bbfbf24e29fe0dd8c8c72870324fbfcdbe5a9f39f1d83423e64b9365d6c98864436279c2988bccbdc930e89d4b57631fde725eee5ffbf6cc7f821297fa4f891bfd1d5f827f593e589c1e23bdc594fe0a9b93f12656ec5c05eddcc983d540e0ec67c062a5d74ddb2e4d987b5ee61d90d5dd675c7672ac7272475df235073e5ee4e8d6980e2dee709d6528841d5bc1ece2ecc4c1494007ebe62464e2728f29b85b15f202acad219a0fc4f01edbf187a41b812c44cae5003cb52bd917709e5fe49c082e5c59623a6bd56829597b1fa20f16c80441c3327aae1bb759ca6d0070fab151622ce43495b9f6a4e757a3f55c0fc816269d50557bde82a8b1dc447be3cc3f68853da2b65b599ff3477496b400b8861a65d53f6c28fc69584bed9440fa5ea6ce06257144c39959b118c322b3e2672f308eb5a5b9debbca3b2fe9a29444c82b7ef0a184fa48ba5796a1905b24b1f5916288d72c60484cdca7516e6c4ad51b3b71c4c4030985be49cea641d9d2d9b5c1e9d610c2550bdd1b6dca", 0xe81, r0) [ 294.634456][T19532] isofs_fill_super: root inode is not a directory. Corrupted media? [ 294.637910][T19535] misc userio: Invalid payload size [ 294.809186][ T9183] usb 1-1: Using ep0 maxpacket: 16 [ 294.917633][ T3677] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 294.950749][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 294.973125][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 295.002048][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 295.026705][ T9183] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 295.157730][ T3677] usb 2-1: Using ep0 maxpacket: 8 [ 295.197996][ T9183] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.40 [ 295.207053][ T9183] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 295.216085][ T9183] usb 1-1: Product: syz [ 295.220583][ T9183] usb 1-1: Manufacturer: syz [ 295.225180][ T9183] usb 1-1: SerialNumber: syz [ 295.277618][ T3677] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 295.286237][ T3677] usb 2-1: config 0 has no interface number 0 [ 295.307626][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 295.319481][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 295.331221][ T3677] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 295.344912][ T3677] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 295.354502][ T3677] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 295.364843][ T3677] usb 2-1: config 0 descriptor?? [ 295.497799][ T9183] usbhid 1-1:1.0: can't add hid device: -22 [ 295.503817][ T9183] usbhid: probe of 1-1:1.0 failed with error -22 [ 295.513153][ T9183] usb 1-1: USB disconnect, device number 4 [ 295.822354][ T3677] usb 2-1: USB disconnect, device number 14 [ 295.837561][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x16, r0, 0x0) 20:26:15 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:26:15 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 20:26:15 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240), 0x0, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000080)='big_key\x00', 0x0, &(0x7f0000000180)="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", 0xe01, r0) 20:26:16 executing program 2: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x77359400}) [ 296.070773][T19582] isofs_fill_super: root inode is not a directory. Corrupted media? 20:26:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:16 executing program 4: select(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x77359400}) 20:26:16 executing program 0: select(0x40, &(0x7f0000000080)={0x966}, 0x0, 0x0, 0x0) 20:26:16 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d030000", 0x4b, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:16 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1e7d, 0x2cf6, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2, &(0x7f0000000140)=@string={0x2}}]}) 20:26:16 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) [ 296.414224][T19606] ISOFS: unable to read i-node block 56 [ 296.428049][T19606] isofs_fill_super: get root inode failed 20:26:16 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 20:26:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000002480), 0x4) 20:26:16 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d030000", 0x4b, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) [ 296.656951][T19629] ISOFS: unable to read i-node block 56 [ 296.677611][ T3677] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 296.685230][ T8121] usb 3-1: new high-speed USB device number 8 using dummy_hcd [ 296.688611][T19629] isofs_fill_super: get root inode failed 20:26:16 executing program 0: keyctl$link(0x1d, 0x0, 0x0) 20:26:16 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d030000", 0x4b, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 296.891069][T19641] ISOFS: unable to read i-node block 56 [ 296.900727][T19641] isofs_fill_super: get root inode failed [ 296.927500][ T3677] usb 2-1: Using ep0 maxpacket: 8 [ 296.932575][ T8121] usb 3-1: Using ep0 maxpacket: 16 [ 297.048357][ T3677] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 297.058004][ T8121] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 297.075874][ T3677] usb 2-1: config 0 has no interface number 0 [ 297.082338][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 297.093403][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 297.105378][ T3677] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 297.119450][ T8121] usb 3-1: language id specifier not provided by device, defaulting to English [ 297.128765][ T3677] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 297.138588][ T3677] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 297.153594][ T3677] usb 2-1: config 0 descriptor?? [ 297.247858][ T8121] usb 3-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.40 [ 297.256913][ T8121] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 297.282231][ T8121] usb 3-1: Product: syz [ 297.292599][ T8121] usb 3-1: Manufacturer: syz [ 297.297252][ T8121] usb 3-1: SerialNumber: syz [ 297.339955][ T8121] usbhid 3-1:1.0: couldn't find an input interrupt endpoint [ 297.539272][ T9183] usb 3-1: USB disconnect, device number 8 [ 297.599979][ T8121] usb 2-1: USB disconnect, device number 15 [ 297.617448][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:18 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:18 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 20:26:18 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b", 0x70, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:18 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 298.169786][T19677] ISOFS: unable to read i-node block 56 [ 298.197573][T19677] isofs_fill_super: get root inode failed [ 298.317438][ T9183] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 298.417450][ T8121] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 298.587408][ T9183] usb 3-1: Using ep0 maxpacket: 16 [ 298.657392][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 298.717433][ T9183] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 298.767549][ T9183] usb 3-1: language id specifier not provided by device, defaulting to English [ 298.777441][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 298.785728][ T8121] usb 2-1: config 0 has no interface number 0 [ 298.807436][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 298.827418][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 298.838631][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 298.851773][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 298.860914][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 298.872021][ T8121] usb 2-1: config 0 descriptor?? [ 298.927398][ T9183] usb 3-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.40 [ 298.936502][ T9183] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 298.949224][ T9183] usb 3-1: Product: syz [ 298.953403][ T9183] usb 3-1: Manufacturer: syz [ 298.958771][ T9183] usb 3-1: SerialNumber: syz [ 299.009476][ T9183] usbhid 3-1:1.0: couldn't find an input interrupt endpoint 20:26:19 executing program 2: 20:26:19 executing program 4: 20:26:19 executing program 3: 20:26:19 executing program 0: 20:26:19 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b", 0x70, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 299.217580][ T9183] usb 3-1: USB disconnect, device number 9 20:26:19 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x4200, 0x0) 20:26:19 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6c, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0x7, 0xb7, [@dev]}, @timestamp={0x44, 0x4, 0x0, 0x3}]}}}}}}, 0x0) 20:26:19 executing program 2: [ 299.310116][ T9003] usb 2-1: USB disconnect, device number 16 [ 299.324616][T19716] ISOFS: unable to read i-node block 56 [ 299.330255][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 299.405444][T19716] isofs_fill_super: get root inode failed 20:26:19 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:19 executing program 4: 20:26:19 executing program 2: 20:26:19 executing program 3: 20:26:19 executing program 0: 20:26:19 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b", 0x70, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:19 executing program 2: 20:26:19 executing program 4: request_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) 20:26:19 executing program 0: 20:26:19 executing program 3: [ 299.912275][T19746] ISOFS: unable to read i-node block 56 [ 299.922010][T19746] isofs_fill_super: get root inode failed 20:26:19 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c012000000000", 0x83, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:19 executing program 0: [ 300.082247][T19760] ISOFS: unable to read i-node block 56 [ 300.096072][T19760] isofs_fill_super: get root inode failed [ 300.177967][ T8121] usb 2-1: new high-speed USB device number 17 using dummy_hcd [ 300.427332][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 300.547334][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 300.555572][ T8121] usb 2-1: config 0 has no interface number 0 [ 300.562083][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 300.573557][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 300.584885][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 300.598431][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 300.609084][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 300.618853][ T8121] usb 2-1: config 0 descriptor?? [ 301.060245][ T9183] usb 2-1: USB disconnect, device number 17 [ 301.077279][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:21 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:21 executing program 4: 20:26:21 executing program 2: 20:26:21 executing program 3: 20:26:21 executing program 0: 20:26:21 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c012000000000", 0x83, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:21 executing program 2: 20:26:21 executing program 0: 20:26:21 executing program 3: 20:26:21 executing program 0: [ 301.638413][T19791] ISOFS: unable to read i-node block 56 [ 301.649221][T19791] isofs_fill_super: get root inode failed 20:26:21 executing program 4: pkey_mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000100)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x78) 20:26:21 executing program 2: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff9) [ 301.857234][ T9183] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 302.097224][ T9183] usb 2-1: Using ep0 maxpacket: 8 [ 302.240531][ T9183] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 302.257244][ T9183] usb 2-1: config 0 has no interface number 0 [ 302.263663][ T9183] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 302.276636][ T9183] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 302.288535][ T9183] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 302.302459][ T9183] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 302.327195][ T9183] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 302.336024][ T9183] usb 2-1: config 0 descriptor?? [ 302.809782][ T9183] usb 2-1: USB disconnect, device number 18 [ 302.817179][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:23 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:23 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c012000000000", 0x83, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:23 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 20:26:23 executing program 0: 20:26:23 executing program 2: 20:26:23 executing program 4: 20:26:23 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000002640)=[{&(0x7f0000000500)="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", 0xffe, 0x3}], 0x0, 0x0) 20:26:23 executing program 2: pkey_mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 20:26:23 executing program 3: pkey_mprotect(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000083c0)={0x0, 0x3938700}) pkey_mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 20:26:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8904, &(0x7f0000000540)={'dummy0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) [ 303.396814][T19836] ISOFS: unable to read i-node block 56 [ 303.430201][T19836] isofs_fill_super: get root inode failed 20:26:23 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae000020", 0x8c, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:23 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xffffffffffffffff) pipe2(&(0x7f0000000380), 0x0) [ 303.777129][ T9003] usb 2-1: new high-speed USB device number 19 using dummy_hcd [ 304.037104][ T9003] usb 2-1: Using ep0 maxpacket: 8 [ 304.187113][ T9003] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 304.195193][ T9003] usb 2-1: config 0 has no interface number 0 [ 304.217168][ T9003] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 304.228882][ T9003] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 304.240642][ T9003] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 304.254466][ T9003] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 304.264272][ T9003] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 304.273526][ T9003] usb 2-1: config 0 descriptor?? [ 304.750579][ T3677] usb 2-1: USB disconnect, device number 19 [ 304.757056][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:25 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400, 0x0) 20:26:25 executing program 2: mq_open(&(0x7f0000000280)='gtp\x00', 0x40, 0x0, 0x0) 20:26:25 executing program 3: setuid(0xee01) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) 20:26:25 executing program 4: getrusage(0x0, &(0x7f00000000c0)) pkey_mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f00003e5000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f00003e5000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 20:26:25 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae000020", 0x8c, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:25 executing program 3: write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) 20:26:25 executing program 2: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)="7bc4505383272a2af313a4bb87b62e6992c2368d3283dbfb70c39ad57aca59c06afaad44cf4ccb141c5bdbbffece2ad6cb9dc88ea56d97b2e7b23450ccd94bddcb472c3930005b9a3e3ec9fa0310a97aa21f8310", 0x54}, {&(0x7f0000000400)="8233f6f4f035930cbe208f409ab04dd4f349d27dbbb48dc489734113652f91a0cf67bdd5cef6405de097b093e4c10e0e5152801fb1ffd3a591d4b419bd8b9661da90dec572501ab587cbc26b2872db98942bece4e0b1b8c32f08cbf8d1d055aacb5014e56903f08827b67625910191caad8413860f7178bb2e1c8d6391b28d2bdf7f32f01e7e8d4860b3b20d", 0x8c}, {&(0x7f0000000b00)="f7c98f56fe3a", 0x6}, {&(0x7f0000000500)="176e0e08cc0a5c595799743d81f33f864e4332", 0x13}, {&(0x7f0000000580)="96eb069e35d01216bfe0640bfac50aadb7c0ed2f3ba3af9f8334642950f802d1ccc86848179537736ef4204fc58dcf2ed8bdb757599d4a797d18d773473d2cd3aaef64e8288fe4bdbc9e82c1af1492c504c8b3a62c0c82dfbb9d0f3027fa6ce8f3cabdfda141ba6e97e6ba48ee006977d8dcd5e5f5fa69b6b5aaa271f2783ea9fc85166905f2f57265d67a54206aa33e03e23a1710da0562e5c5a65ddc4c77d6199861210ff9ee20c3b58c7f77a089a092dda8d76f9dc0b99000429912142ec2619bbabd0b876a495db382bb29d96531cd086bed5d32d3cf71f3b0996092e2ffd717a2693eec4cc8a086c8f88308e3", 0xfffffec7}, {&(0x7f0000000680)="3d137c1fdf428f5590e5055df01e3be18a1378c83b0f30908c1ba79e244e908d931b38fc7341bc7cf93bdd8e25ff821796b0926b5fa05e57fd5c110ef430a4ec3fd852b7950cacf8fb51ffb3fa6cf1fc2a1edd26feda6eb64b95e0eab2216502f9d342550c0aa9101a47110297baef2ebb", 0x71}, {&(0x7f0000000700)="94380d242fd166b42cefc3ee3a809777bb85c85851b4f632cfb543ecf931c0b5f938e08b763f3a811eac40af6cc89d56becfbe42a2c1805a9aa39a9d2078e10bdd150b6068c5e1ed9af4629bcb5716002f812c81d51bbf1250d77485277b552a514d7e1a7384ad7744bf6330037793da7daba63d4a324f0d9b733f1e5beb0c0e32a77503c765b21e1d7861b1a7802eb13d677d27528a64ab7abe8c1e9d29f85dd09706be5e5bddd62e46c906319ff8e1cb2b985747034039a0b6193d11a6a2476eebfcea99869f6f40b32a6196c8a0b1eaece9bf0aaf6a48a7fb286e7c95d78d86e020c3670a59cc", 0xe8}, {&(0x7f0000000800)="49969f5c5f1a3e61bdfa7dd8fbd9480c6ca02fa3546bcbea0d1c140d1baf4f7adc5ef76bfa88186d724d80ca6885f9b72b375215cfea2a79e8a71642c661a773fb4452ce0b2e7650b8ffbe7d6655c99ca497955881137a6d400451d6131f9f6b4d434c8564ea99b31a908fc04dd58dbf20996d98d06ec768e7c9c41b288a29b34a6a1c75bee106f8208c66fcec2040457999096a894de38121926b9cf24c9e5679366cc51271176d1b61a4b12af43711c2d2b67a1cd2001d09a7c92aee4c0c9c35f50cc6b817", 0xc6}, {&(0x7f0000000900)="5870700c988fe184c43d26632a29df1b1370dca66a6dbf852b6fd97617e0dfac84f918816f18cacdcad5b5ed798a72b1b88eb74d3c306c6581f8b5b7cf1636b0a86c674aeaf93850", 0x48}, {&(0x7f0000000980)="976f4aceedd8a11cfc4a69d69f87d82c17952848e349faa3331a3166108cf062ca9be66f6ace5f8ebe992ae6f6048909abdc96237539a7ca3c3253a49e1a2279cce59c2d9b4ddfa82f87bacb9578d9ea648bbc8a878815546dce0fce27148e351a9cf8bde3ecf7", 0x67}], 0xa, 0x0) 20:26:25 executing program 3: getrusage(0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 20:26:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r0) 20:26:25 executing program 4: socketpair(0xa, 0x2, 0x88, &(0x7f00000000c0)) 20:26:25 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae000020", 0x8c, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 305.618629][ T4615] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 305.877028][ T4615] usb 2-1: Using ep0 maxpacket: 8 [ 306.015591][ T4615] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 306.030218][ T4615] usb 2-1: config 0 has no interface number 0 [ 306.036367][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 306.049115][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 306.060316][ T4615] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 306.074857][ T4615] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 306.084293][ T4615] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 306.093621][ T4615] usb 2-1: config 0 descriptor?? [ 306.551731][ T9183] usb 2-1: USB disconnect, device number 20 [ 306.570732][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:26 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:26 executing program 2: setuid(0xee01) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x200000) 20:26:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000000)={'ip6erspan0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 20:26:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) mq_getsetattr(r0, &(0x7f0000000000), &(0x7f0000000040)) 20:26:26 executing program 3: add_key(&(0x7f0000000200)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 20:26:26 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000", 0x91, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:27 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20001, 0x0) 20:26:27 executing program 2: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 20:26:27 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10) 20:26:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000540)={'dummy0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 20:26:27 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000", 0x91, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, 0x0, 0x0) [ 307.417227][ T3677] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 307.657082][ T3677] usb 2-1: Using ep0 maxpacket: 8 [ 307.776933][ T3677] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 307.785130][ T3677] usb 2-1: config 0 has no interface number 0 [ 307.816926][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 307.828359][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 307.845050][ T3677] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 307.859190][ T3677] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 307.868620][ T3677] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 307.883278][ T3677] usb 2-1: config 0 descriptor?? [ 308.330835][ T8121] usb 2-1: USB disconnect, device number 21 [ 308.346858][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:28 executing program 4: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, &(0x7f0000000200)={0x0}) 20:26:28 executing program 2: 20:26:28 executing program 0: prctl$PR_SET_MM_AUXV(0x1c, 0xc, 0x0, 0x0) 20:26:28 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000", 0x91, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:28 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x101}, 0x0, 0x0) 20:26:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x464, 0x4}, 0x10}}, 0x0) 20:26:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000240)=0x6, 0x4) 20:26:28 executing program 3: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:26:28 executing program 4: r0 = inotify_init() r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) dup2(r1, r0) 20:26:28 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae00002000000000000000", 0x93, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:28 executing program 0: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0}) [ 309.176837][ T3677] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 309.417425][ T3677] usb 2-1: Using ep0 maxpacket: 8 [ 309.536849][ T3677] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 309.545175][ T3677] usb 2-1: config 0 has no interface number 0 [ 309.566850][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 309.578606][ T3677] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 309.590379][ T3677] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 309.605304][ T3677] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 309.614718][ T3677] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 309.624797][ T3677] usb 2-1: config 0 descriptor?? [ 310.093393][ T3677] usb 2-1: USB disconnect, device number 22 [ 310.106802][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 20:26:30 executing program 3: prctl$PR_SET_MM_AUXV(0x39, 0xc, &(0x7f0000000040), 0x0) 20:26:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1086002, &(0x7f0000000540)) 20:26:30 executing program 0: getrusage(0x0, &(0x7f00000000c0)) pkey_mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f00003e5000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) 20:26:30 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae00002000000000000000", 0x93, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) inotify_rm_watch(r0, 0x0) 20:26:30 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae00002000000000000000", 0x93, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:30 executing program 2: getrusage(0x0, &(0x7f00000000c0)) pkey_mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x2, 0xffffffffffffffff) pkey_mprotect(&(0x7f00003e5000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) 20:26:30 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 20:26:30 executing program 0: add_key(&(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="a4bc027dd4556267c6d28b895efe4d2aabce8a3ea2ad0cb61c828aa9889c9e113ac9288f7c2e3ff353380b49ceee41ae06089cf528493400efe7f114d2acc5b6803164bad026b2fd7394bf40246d26913e3a46c4826a00", 0xfffffffffffffe02, 0x0) 20:26:30 executing program 3: r0 = inotify_init() dup2(0xffffffffffffffff, r0) [ 310.967017][ T4615] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 311.236708][ T4615] usb 2-1: Using ep0 maxpacket: 8 [ 311.388584][ T4615] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 311.397226][ T4615] usb 2-1: config 0 has no interface number 0 [ 311.403324][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 311.414548][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 311.428816][ T4615] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 311.442096][ T4615] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 311.452660][ T4615] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 311.461626][ T4615] usb 2-1: config 0 descriptor?? [ 311.911824][T19635] usb 2-1: USB disconnect, device number 23 [ 311.936664][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x5460, 0x0) 20:26:32 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000", 0x94, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:32 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000002240)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x78) 20:26:32 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002140)='ns/net\x00') 20:26:32 executing program 4: pkey_mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) pkey_mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 20:26:32 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0xc4442) creat(0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000140)={0x90}, 0x90) 20:26:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x5411, 0x0) 20:26:32 executing program 4: setuid(0xee01) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x8001, 0x0) 20:26:32 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000", 0x94, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:32 executing program 2: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0xc0) 20:26:32 executing program 3: pkey_mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x2, 0xffffffffffffffff) [ 312.787416][ T9003] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 313.046633][ T9003] usb 2-1: Using ep0 maxpacket: 8 [ 313.177063][ T9003] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 313.185370][ T9003] usb 2-1: config 0 has no interface number 0 [ 313.192958][ T9003] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 313.204689][ T9003] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 313.216399][ T9003] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 313.230147][ T9003] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 313.242432][ T9003] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 313.251760][ T9003] usb 2-1: config 0 descriptor?? [ 313.722599][T19635] usb 2-1: USB disconnect, device number 24 [ 313.736582][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:26:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, 0x0, 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:34 executing program 0: pkey_mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) 20:26:34 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_gettime(0x0, &(0x7f0000000140)) 20:26:34 executing program 2: prctl$PR_SET_MM_AUXV(0x18, 0xc, 0x0, 0x0) 20:26:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000", 0x94, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:34 executing program 3: ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000002000/0x4000)=nil, 0xa07400, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xb, 0xffffffffffffffff) 20:26:34 executing program 0: r0 = socket(0x2, 0xa, 0x0) recvmmsg(r0, &(0x7f0000004600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010120, 0x0) 20:26:34 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)) 20:26:34 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 20:26:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000000)={0xffffffffffffffff}) dup2(r0, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vxcan1\x00'}) 20:26:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:34 executing program 3: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, 0x0, &(0x7f0000000000)='\\\x00') [ 314.519090][T20216] isofs_fill_super: root inode is not a directory. Corrupted media? 20:26:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, 0x0, 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:34 executing program 0: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x0, 0x0) 20:26:34 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10002, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 20:26:34 executing program 3: clone(0x42218d00, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x322, 0x7f, 0xb6, 0xfd, 0x1f, @broadcast}, @can={0x1d, 0x0}, @vsock={0x28, 0x0, 0x0, @hyper}, 0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='batadv_slave_0\x00', 0x7ff, 0xffffffffffff7fff, 0x982c}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002ec0)={'erspan0\x00', &(0x7f0000002dc0)={'gre0\x00', 0x0, 0x20, 0x1, 0x7, 0x1, {{0x2a, 0x4, 0x1, 0x4, 0xa8, 0x64, 0x0, 0x0, 0x4, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x4c, 0x8c, 0x3, 0x8, [{@loopback, 0x5}, {@private=0xa010102}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@empty}, {@private=0xa010101}, {@rand_addr=0x64010100, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1f}]}, @generic={0x0, 0x6, "09a08130"}, @rr={0x7, 0xf, 0xd7, [@broadcast, @multicast2, @private=0xa010100]}, @timestamp={0x44, 0x10, 0xda, 0x0, 0x2, [0xffff, 0x0, 0x7]}, @ssrr={0x89, 0x13, 0x34, [@empty, @rand_addr=0x64010100, @multicast2, @multicast1]}, @ra={0x94, 0x4}, @ra={0x94, 0x4}, @noop]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000003000)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f00)={0x90, r0, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x80a0}, 0x800) 20:26:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8060}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 314.874994][T20234] isofs_fill_super: root inode is not a directory. Corrupted media? [ 314.895015][T20236] IPVS: ftp: loaded support on port[0] = 21 20:26:34 executing program 3: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x5}, &(0x7f0000000280)={0x3}, 0x0, 0x0) 20:26:34 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x5}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340), 0x8}) 20:26:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x18, @in6=@local, @in6=@local}]}, 0x38}}, 0x0) 20:26:35 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:35 executing program 3: symlink(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='.\x00') 20:26:35 executing program 0: r0 = socket(0x11, 0x2, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 20:26:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, 0x0, 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:35 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46400) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:26:35 executing program 4: clone(0x42218d00, 0x0, 0x0, 0x0, 0x0) pause() ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x0, 0x7f, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @can, @vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff7fff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) 20:26:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 20:26:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008f3d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 315.362111][T20286] isofs_fill_super: root inode is not a directory. Corrupted media? 20:26:35 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008f3d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 20:26:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r1) setresgid(0x0, 0x0, 0x0) [ 315.494041][T20301] IPVS: ftp: loaded support on port[0] = 21 20:26:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02060600020000002c"], 0x10}}, 0x0) 20:26:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008f3d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 315.620174][T20327] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:26:35 executing program 4: clone(0x42218d00, 0x0, 0x0, 0x0, 0x0) pause() ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x0, 0x7f, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @can, @vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff7fff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) 20:26:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008f3d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 315.819532][T20347] IPVS: ftp: loaded support on port[0] = 21 20:26:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYRES64], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000340)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendto$packet(r2, &(0x7f00000000c0)="b23d921378e9a83f1254ccf05513780f88a8", 0x1016, 0x8848, &(0x7f0000000040)={0x11, 0x4305, r4, 0x1, 0x0, 0x6, @dev}, 0x14) 20:26:36 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:36 executing program 0: clone(0xfcaded80, 0x0, 0x0, 0x0, 0x0) 20:26:36 executing program 3: r0 = socket(0x2, 0x3, 0x5) sendmmsg$sock(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @private}, 0x80, 0x0}}, {{&(0x7f0000000080)=@in={0x2, 0x0, @private}, 0xf, 0x0}}], 0x2, 0x0) 20:26:36 executing program 4: clone(0x42218d00, 0x0, 0x0, 0x0, 0x0) pause() ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x0, 0x7f, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @can, @vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff7fff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) 20:26:36 executing program 3: lstat(&(0x7f0000006480)='./file0\x00', 0x0) [ 316.306512][ T9183] usb 2-1: new high-speed USB device number 25 using dummy_hcd [ 316.328280][T20388] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 316.334801][T20390] IPVS: ftp: loaded support on port[0] = 21 20:26:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @random="500d1ab3fb86", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:26:36 executing program 0: syz_usb_connect$uac1(0x0, 0x85, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @processing_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x3, 0x16, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 20:26:36 executing program 4: clone(0x42218d00, 0x0, 0x0, 0x0, 0x0) pause() ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x0, 0x7f, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @can, @vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff7fff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) 20:26:36 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000200)={0x268, 0x1, 0x5, 0x3, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "0f0c8f9e06756bbc95786f62c8b6d54d47742223db14c6c59cdf6a028fdb0a9c", "e1fbd28a014b6e05c7bfde1e81cf9fa5015e7f64dc8ea1da2e180f1738697311"}}}]}, 0x268}}, 0x0) [ 316.499545][T20424] IPVS: ftp: loaded support on port[0] = 21 [ 316.527916][ T9183] usb 2-1: device descriptor read/64, error 18 [ 316.580649][T20431] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 316.800020][ T4615] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 316.807527][ T9183] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 316.997785][ T9183] usb 2-1: device descriptor read/64, error 18 [ 317.076453][ T4615] usb 1-1: Using ep0 maxpacket: 32 [ 317.118270][ T9183] usb usb2-port1: attempt power cycle [ 317.216763][ T4615] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 317.225643][ T4615] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 317.247816][ T4615] usb 1-1: config 1 has no interface number 1 [ 317.260569][ T4615] usb 1-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 317.286472][ T4615] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 317.476547][ T4615] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 317.496445][ T4615] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 317.504576][ T4615] usb 1-1: Product: syz [ 317.516411][ T4615] usb 1-1: Manufacturer: syz [ 317.516420][ T4615] usb 1-1: SerialNumber: syz [ 317.836427][ T4615] usb 1-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 317.850606][ T9183] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 317.868184][ T4615] usb 1-1: USB disconnect, device number 5 [ 318.046505][ T9183] usb 2-1: device descriptor read/8, error -61 [ 318.318401][ T9183] usb 2-1: new high-speed USB device number 28 using dummy_hcd [ 318.516362][ T9183] usb 2-1: device descriptor read/8, error -61 [ 318.536387][ T9433] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 318.646632][ T9183] usb usb2-port1: unable to enumerate USB device [ 318.776340][ T9433] usb 1-1: Using ep0 maxpacket: 32 [ 318.896651][ T9433] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 318.909505][ T9433] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 318.919442][ T9433] usb 1-1: config 1 has no interface number 1 [ 318.925615][ T9433] usb 1-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 318.938839][ T9433] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 20:26:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:38 executing program 2: syz_usb_connect$uac1(0x0, 0x97, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x85, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @processing_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2, "7f"}, @format_type_i_discrete={0x8}, @format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 20:26:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) 20:26:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000012580)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f000000af40)={0x0, 0x0, &(0x7f000000ae80)=[{&(0x7f0000009a80)=""/133, 0x85}, {&(0x7f0000009dc0)=""/155, 0x9b}, {&(0x7f0000009e80)=""/4096, 0x1000}], 0x3}, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 20:26:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 319.073452][T20496] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 319.107487][ T9433] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 20:26:39 executing program 3: syz_usb_connect$uac1(0x0, 0x7e, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6c, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x3, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) [ 319.121363][ T9433] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 319.139421][ T9433] usb 1-1: Product: syz [ 319.148060][ T9433] usb 1-1: Manufacturer: syz [ 319.158281][ T9433] usb 1-1: SerialNumber: syz 20:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@ipv4_delrule={0x1c, 0x21, 0x1}, 0x1c}}, 0x0) 20:26:39 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 319.313555][T20518] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 319.327508][ T3677] usb 3-1: new high-speed USB device number 10 using dummy_hcd 20:26:39 executing program 0: syz_usb_connect$uac1(0x0, 0x85, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @processing_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x3, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 20:26:39 executing program 4: syz_usb_connect$uac1(0x0, 0x85, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @processing_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x3, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 20:26:39 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 319.481081][T20529] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 319.489418][ T8121] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 319.497242][ T9433] usb 1-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 319.516559][ T17] usb 2-1: new high-speed USB device number 29 using dummy_hcd 20:26:39 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080), 0x0, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 319.527270][ T9433] usb 1-1: USB disconnect, device number 6 [ 319.566659][ T3677] usb 3-1: Using ep0 maxpacket: 32 [ 319.598712][T20554] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 319.696090][ T3677] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 319.716304][ T17] usb 2-1: device descriptor read/64, error 18 [ 319.728195][ T3677] usb 3-1: config 1 has no interface number 1 [ 319.736320][ T54] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 319.746458][ T8121] usb 4-1: Using ep0 maxpacket: 32 [ 319.758978][ T3677] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 319.771210][ T3677] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 319.784472][ T3677] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 319.803715][ T3677] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 319.876316][ T8121] usb 4-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 319.885463][ T9433] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 319.894672][ T8121] usb 4-1: config 1 has no interface number 1 [ 319.901239][ T8121] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 319.913854][ T8121] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 319.966313][ T3677] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 319.977917][ T3677] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 319.986055][ T3677] usb 3-1: Product: syz [ 319.992189][ T3677] usb 3-1: Manufacturer: syz [ 319.998805][ T17] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 320.006669][ T54] usb 5-1: Using ep0 maxpacket: 32 [ 320.012074][ T3677] usb 3-1: SerialNumber: syz [ 320.096312][ T8121] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 320.116260][ T8121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 320.124262][ T8121] usb 4-1: Product: syz [ 320.129642][ T54] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 320.138440][ T8121] usb 4-1: Manufacturer: syz [ 320.143147][ T8121] usb 4-1: SerialNumber: syz [ 320.148555][ T9433] usb 1-1: Using ep0 maxpacket: 32 [ 320.153717][ T54] usb 5-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 320.165820][ T54] usb 5-1: config 1 has no interface number 1 [ 320.173307][ T54] usb 5-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 320.185192][ T54] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 320.206299][ T17] usb 2-1: device descriptor read/64, error 18 [ 320.276648][ T9433] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 320.285366][ T9433] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 320.295374][ T9433] usb 1-1: config 1 has no interface number 1 [ 320.303084][ T9433] usb 1-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 320.315004][ T9433] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 320.330345][ T17] usb usb2-port1: attempt power cycle [ 320.335763][ T9433] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 320.349275][ T9433] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 320.368302][ T54] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 320.381425][ T3677] usb 3-1: USB disconnect, device number 10 [ 320.388391][ T54] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 320.403544][ T54] usb 5-1: Product: syz [ 320.408580][ T54] usb 5-1: Manufacturer: syz [ 320.413327][ T54] usb 5-1: SerialNumber: syz [ 320.476278][ T8121] usb 4-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 320.503920][ T8121] usb 4-1: USB disconnect, device number 2 [ 320.516276][ T9433] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 320.525530][ T9433] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 320.542285][ T9433] usb 1-1: Product: syz [ 320.557005][ T9433] usb 1-1: Manufacturer: syz [ 320.567683][ T9433] usb 1-1: SerialNumber: syz [ 320.736309][ T54] usb 5-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 320.764069][ T54] usb 5-1: USB disconnect, device number 4 [ 320.924317][ T9433] usb 1-1: USB disconnect, device number 7 [ 321.036412][ T4615] usb 3-1: new high-speed USB device number 11 using dummy_hcd [ 321.046217][ T17] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 321.216221][ T17] usb 2-1: device descriptor read/8, error -61 [ 321.256214][ T8121] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 321.306195][ T4615] usb 3-1: Using ep0 maxpacket: 32 [ 321.426198][ T9433] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 321.436949][ T4615] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 321.445880][ T4615] usb 3-1: config 1 has no interface number 1 [ 321.466172][ T4615] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 321.477693][ T4615] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 321.491144][ T4615] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 321.497349][ T8121] usb 4-1: Using ep0 maxpacket: 32 [ 321.503008][ T4615] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 321.507169][ T17] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 321.596230][ T54] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 321.656210][ T8121] usb 4-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 321.665355][ T8121] usb 4-1: config 1 has no interface number 1 [ 321.671924][ T9433] usb 5-1: Using ep0 maxpacket: 32 [ 321.686595][ T4615] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 321.686619][ T8121] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 321.700255][ T4615] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 321.707591][ T17] usb 2-1: device descriptor read/8, error -61 [ 321.721076][ T8121] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 321.731635][ T4615] usb 3-1: Product: syz [ 321.746572][ T4615] usb 3-1: Manufacturer: syz [ 321.751160][ T4615] usb 3-1: SerialNumber: syz [ 321.797821][ T9433] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 321.807286][ T9433] usb 5-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 321.816707][ T9433] usb 5-1: config 1 has no interface number 1 [ 321.822899][ T9433] usb 5-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 321.835694][ T9433] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 321.848846][ T54] usb 1-1: Using ep0 maxpacket: 32 [ 321.854404][ T17] usb usb2-port1: unable to enumerate USB device [ 321.886271][ T8121] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 321.895412][ T8121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 321.904219][ T8121] usb 4-1: Product: syz [ 321.908819][ T8121] usb 4-1: Manufacturer: syz [ 321.913503][ T8121] usb 4-1: SerialNumber: syz [ 321.978028][ T54] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 321.987338][ T54] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 321.998278][ T54] usb 1-1: config 1 has no interface number 1 [ 322.004548][ T54] usb 1-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 20:26:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:41 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080), 0x0, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f000000d540)={&(0x7f000000c080)=@xdp={0x2c, 0x0, 0x0, 0x16}, 0x80, &(0x7f000000d100), 0x0, &(0x7f0000004100)=ANY=[@ANYBLOB="10000000000000000000000000000000000000000000000000180000000000000000000000080100004c00"/56], 0x38}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002b00)) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)="ab4cc2b251d91b8629aa70b49d6a7850a72ddcadd77557b0e2800f6225cab2d92b823f6d44a7a353764ab97210e02301163132893bad1c18231644691e0c51325d34970217ad135de18dfa23b8a1e8edb59957f49667dd25a0d4d787fbf2366f403147a56cdc25a1c793d99cd88f212ec10ab159549ade79189aa294f1669896ae2f0a97cb46c70b91af", 0x8a}, {&(0x7f0000000180)="2f48ac997b110a2d2120a939184a9e55a6dc38ec640e1840237766e690753a32e3e7ef23b927af2382fe2389645f40bb90c7714d532a26d8f01f91a3d98fa3538cc63f024b0d87e6b48f4abc7428d1acb563b6dafbc519bde288df3c4200e24380d330cea2c4881ecaa9a2b00197cf1344a02cbcdf4aa8e8b41e416ba2129b6ab602edaba1a567b27d18bd1a058386d908f9e09bb869bd15bdc234f0d22e07e9", 0xa0}, {&(0x7f0000000280)="6e1df07ce677e8a7bd6509a21894eddc5af46c881b767db3b5e83d3239f90da6e5eb4202f82a1ca97b32c08dc6ccb4fabc1ac5d271b959ad7d9193dbf6134b016d84f30adf7c07a0a075b8c07da018fb12ea2bc7ce542c4735c5e5a766eab192f46d86a8ceff97386c170f4c2822b04b88e8ebe72209f741891224d0ece4545e616a1a30a6a0c6fada4da0982319e4c8d254a5b48f7e3d2caae9eb3387adf5b7d2aefcda15955eb81c6f060761e7aca980caec71ec358f", 0xb7}, {&(0x7f00000003c0)="311636ae68c74f62d4fdca", 0xb}, {&(0x7f0000000400)="e042d7eac683ba9feb218990243a560548b04894e25d77b72e1520e89672c70b66eceacf0a059e814b3be4f45a9917301fe750271ce9532a155f6d1f9bca5f36e3bbedeadda7cce00f1f", 0x4a}, {&(0x7f0000000480)="97908be186d8957fae6ab6428e875dd6b6ff6e64c234bbc3fe0e5946624828faad8ff425c8e4610d19fc53cc9572fa956a462c32ebaab3df9225c8e26677fad710b6e907220df420b3b1bfa16a2dbc696387f059c03f4b706e85", 0x5a}, {&(0x7f0000000500)="f1fed102c53f56bfedf71394799ad127df268935ab9fe2f712757e0aa4337a45f66cd7123905a73b590840383a352ac9b02114990da45a36d077b5f538613a5551ef808ebc593287bf9dc9126ec60090881bf3320d7d24be941d579a1f48269b14d4", 0x62}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000580)="e5fa551df671646fb4e97096ba5174ad8d9e7ea4bef441ede1425b7b6d8d80eddc169c9c75711bff7f41ccdcf2b681371773630ad79d9d0e723a9c0831db86b71c78019d80ebfa3504f5fe30634c608259dc9b3d63a2e33ae66377acf4b479c8d765280d1c726e1351da5d76e4f5c1ba4e2a1fcb86cd8e5fbb818bd3f3", 0x7d}], 0x9, &(0x7f0000002b80)=[{0x100, 0x6, 0x1ff, "6feddab9eca0d8859b125289beb176841b2a5c17d3d4fac802812204f152165e2ba0921b7089cfd0a80f2b350d42287e4ec933d731dc40be4b0927912c4a8118dbae22c1a7ec6a14b41060738d0439b7e3b8920212079e76ca0d59f629d6c13085e5ca4b8cb516bf9880ee7cc2711f3b85cfa77ba0811aae49778c61de3b69e0d08a0b59749ed080f83596afa0c585e7ba8b7bb119993f1d5f113bb8ec8b6adad32893d9cec13a563ae2d3912fe5f935222b976541b3556d261a014fde54fb76e78014bd13cd9c536a1a02a1915d9198953859ba750e8d0496ff31b95691587546a51adc028236c5fad78b"}, {0x60, 0x10d, 0x6, "dc3ed2a8fc6b1baeee4a0f8ae2cbd41079270d1d4fe15feff5ed5a36d375249f3a1c6e98e024cab3011e0e70c0c640650b3c2dae91cc54a2ca24f3cad605a1d4e6a83d9d1e77ba5a7c"}, {0xc0, 0x110, 0xcdb, "a2191711a58351fcfb5abc3bc7aa7d5633281cfdd8fc9aa6486f04e67e92c317a188fe541467b91b996bbb1d1cea04c5bae52905a1b66fb50c7fe918a8a5fdf9b869eb92c5ce8ab68a01f44cea0ae6e659f4b34bf9d7ed12fbb10dc502c693f6f29f1fab3716d60b8487553b36d215b4a3f5e7166f460bde564bf77cea1099e84d1217a7f81785e655ee2551a79755cf013b7880117c1a0a2e2aae13c3e9899ea68e18599f1ca41d2eff4009e98b9054"}, {0xf8, 0x118, 0x2, "4fdefd16ffc5acd9ef3ae4bb4fd135898b291ec3e4ef8591c1821a8678c3f6709b5d35f025f8d1700cb7a9c0b714944fa87a797c3957c6aa3711e381a0fabc7a6151a6c4103215ba3b1c67f2f7b6e4caf0544a4149fe9d0d2dcc2105f7de013511a0f359ad8f5dd19ee70b31f3c47c0a9f8acc48de50ccb74796d403e37c8db8a740edc466a547d594727c2d184df07660baa2b4fe719789e9e4c75b7e2a7c0fe8aed866bbff7f9812125d3490d99e668be0ed96a061b72df6598e0aa806f17ebc7766cd375667f9620d317195e93351c1defcfeceadb6e96681c2fbb81643e787bb8a0052"}, {0x88, 0x119, 0x100, "f4b8ddc68b21dc5413302b5f5f96778091e785bb22310bc65a2b77472c2086f4dac1c9eb0f3ed3e70c8ac61a3ec723e3c2fc93e8842aa1ff5a633f502cc4147f0b1efb318b030d9dba49751559deb94272507f1e0d3e6ee7d4305a3cfa77a79c9030b2ebafb9a76609e28df473569ffbda804e26"}, {0xe8, 0x0, 0xfffffffc, "07c861266a127f42f965a18aaf9a8e6818587a84394ab05955bdef279c96ea0ef7dad948a34d0973b1ae41e9b5810ac147264171ac9cd9626b93f23c90ff03c3a026a2691c696a83faf88616a17b2c504cb24318383371c570e6abc090da39e66d553223a94ba2bb4bd3b82b40888b290737e4e7ebb2b763fc395f18182136a137559d771803dfeb5ab23822567bdf2410ac702ded758b595263e9c0a22211d77e497e56722743f5a79ad7191c673dd7ee9344591fc22bfde1d4ea01f09ef200ae8c78e0c6859aa72f779789a8e24bc4315f2afce1c8199e"}, {0x1010, 0x88, 0x0, "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"}, {0x28, 0x119, 0x7, "c1cc3a004d0d828868985a4c273a7e99a5a03d"}], 0x14c0}, 0x4000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0xd40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\xff\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6L\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 322.015915][ T54] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 322.032018][ T9433] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 322.052007][ T9433] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 322.095815][ T9433] usb 5-1: Product: syz [ 322.103672][ T54] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 322.121162][ T4615] usb 3-1: USB disconnect, device number 11 [ 322.123352][ T9433] usb 5-1: Manufacturer: syz [ 322.137133][ T9433] usb 5-1: SerialNumber: syz 20:26:42 executing program 3: syz_usb_connect$uac1(0x0, 0xbc, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xaa, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@input_terminal={0xc}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2, "7f", "67e3"}, @format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, "df"}, @format_type_ii_discrete={0x9}, @format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0xb, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, "5896db"}, @as_header={0x7}, @as_header={0x7}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) [ 322.147654][ T54] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 322.179266][T20682] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 322.236605][ T8121] usb 4-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 322.262131][T20697] device wlan1 entered promiscuous mode [ 322.279146][ T8121] usb 4-1: USB disconnect, device number 3 20:26:42 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080), 0x0, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 322.312670][T20690] device wlan1 left promiscuous mode 20:26:42 executing program 4: syz_usb_connect$uac1(0x0, 0x85, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @processing_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x3, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) [ 322.375031][T20726] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 322.384976][ T54] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 322.391283][T20725] device wlan1 entered promiscuous mode [ 322.399579][ T54] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 20:26:42 executing program 2: 20:26:42 executing program 0: [ 322.443078][ T54] usb 1-1: Product: syz [ 322.461204][ T54] usb 1-1: Manufacturer: syz [ 322.485354][ T9433] usb 5-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 322.492315][T20487] usb 2-1: new high-speed USB device number 33 using dummy_hcd 20:26:42 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:42 executing program 2: 20:26:42 executing program 0: [ 322.532026][ T54] usb 1-1: SerialNumber: syz [ 322.543797][ T9433] usb 5-1: USB disconnect, device number 5 [ 322.567640][ T54] usb 1-1: can't set config #1, error -71 [ 322.574579][ T54] usb 1-1: USB disconnect, device number 8 20:26:42 executing program 0: [ 322.633072][T20769] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 322.706249][T20487] usb 2-1: device descriptor read/64, error 18 [ 322.886797][ T8121] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 322.916138][ T9433] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 322.986185][T20487] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 323.137321][ T8121] usb 4-1: Using ep0 maxpacket: 32 [ 323.156098][ T9433] usb 5-1: Using ep0 maxpacket: 32 [ 323.186369][T20487] usb 2-1: device descriptor read/64, error 18 [ 323.256300][ T8121] usb 4-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 323.276105][ T9433] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 323.294665][ T8121] usb 4-1: config 1 descriptor has 1 excess byte, ignoring [ 323.303260][ T9433] usb 5-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 323.312766][T20487] usb usb2-port1: attempt power cycle [ 323.341463][ T8121] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 323.353824][ T9433] usb 5-1: config 1 has no interface number 1 [ 323.374167][ T9433] usb 5-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 323.391271][ T9433] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 323.546155][ T8121] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 323.555212][ T8121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 323.564473][ T8121] usb 4-1: Product: syz [ 323.569557][ T8121] usb 4-1: Manufacturer: syz [ 323.574317][ T8121] usb 4-1: SerialNumber: syz [ 323.579781][ T9433] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 323.592116][ T9433] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 323.601764][ T9433] usb 5-1: Product: syz [ 323.605928][ T9433] usb 5-1: Manufacturer: syz [ 323.613099][ T9433] usb 5-1: SerialNumber: syz [ 323.906191][ T8121] usb 4-1: 0:2 : does not exist [ 323.922929][ T8121] usb 4-1: USB disconnect, device number 4 [ 323.996092][ T9433] usb 5-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 324.026121][T20487] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 324.040905][ T9433] usb 5-1: USB disconnect, device number 6 [ 324.216059][T20487] usb 2-1: device descriptor read/8, error -61 [ 324.486040][T20487] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 324.616173][ T9183] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 324.656036][T20487] usb 2-1: device descriptor read/8, error -61 [ 324.776074][T20487] usb usb2-port1: unable to enumerate USB device [ 324.866034][ T9183] usb 4-1: Using ep0 maxpacket: 32 [ 325.006448][ T9183] usb 4-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 325.015333][ T9183] usb 4-1: config 1 descriptor has 1 excess byte, ignoring [ 325.024545][ T9183] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 20:26:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:45 executing program 2: 20:26:45 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 325.181822][T20851] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 325.218335][ T9183] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 325.230868][ T9183] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 325.256033][ T9183] usb 4-1: Product: syz [ 325.260224][ T9183] usb 4-1: Manufacturer: syz [ 325.264894][ T9183] usb 4-1: SerialNumber: syz 20:26:45 executing program 3: 20:26:45 executing program 0: 20:26:45 executing program 4: syz_usb_connect$uac1(0x0, 0x85, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @processing_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x3, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 20:26:45 executing program 2: 20:26:45 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:45 executing program 2: 20:26:45 executing program 0: 20:26:45 executing program 3: [ 325.436007][ T9183] usb 4-1: 0:2 : does not exist [ 325.442362][T20870] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 325.445240][ T9183] usb 4-1: USB disconnect, device number 5 20:26:45 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 325.585223][T20894] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 325.646027][ T4615] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 325.696461][ T7] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 325.847552][ T4615] usb 2-1: device descriptor read/64, error 18 [ 325.955954][ T7] usb 5-1: Using ep0 maxpacket: 32 [ 326.095989][ T7] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 326.105035][ T7] usb 5-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 326.114850][ T7] usb 5-1: config 1 has no interface number 1 [ 326.121567][ T7] usb 5-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 326.132640][ T4615] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 326.140598][ T7] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 326.335970][ T4615] usb 2-1: device descriptor read/64, error 18 [ 326.336400][ T7] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 326.353498][ T7] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 326.361988][ T7] usb 5-1: Product: syz [ 326.367522][ T7] usb 5-1: Manufacturer: syz [ 326.372273][ T7] usb 5-1: SerialNumber: syz [ 326.455975][ T4615] usb usb2-port1: attempt power cycle [ 326.696008][ T7] usb 5-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 326.724326][ T7] usb 5-1: USB disconnect, device number 7 [ 327.175903][ T4615] usb 2-1: new high-speed USB device number 39 using dummy_hcd [ 327.396306][ T4615] usb 2-1: device descriptor read/8, error -61 [ 327.675951][ T4615] usb 2-1: new high-speed USB device number 40 using dummy_hcd [ 327.856299][ T4615] usb 2-1: device descriptor read/8, error -61 [ 327.987711][ T4615] usb usb2-port1: unable to enumerate USB device 20:26:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:48 executing program 2: 20:26:48 executing program 3: 20:26:48 executing program 0: 20:26:48 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:48 executing program 4: 20:26:48 executing program 3: 20:26:48 executing program 0: 20:26:48 executing program 2: r0 = socket(0x2, 0x3, 0x5) sendmmsg$sock(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @private}, 0x80, 0x0}}, {{&(0x7f0000000080)=@in={0x2, 0x0, @private}, 0x80, 0x0, 0x3e8}}], 0x2, 0x0) 20:26:48 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(0x0) [ 328.259795][T20940] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:26:48 executing program 4: 20:26:48 executing program 0: [ 328.638261][ T4615] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 328.855814][ T4615] usb 2-1: device descriptor read/64, error 18 [ 329.127151][ T4615] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 329.315790][ T4615] usb 2-1: device descriptor read/64, error 18 [ 329.445887][ T4615] usb usb2-port1: attempt power cycle [ 330.155780][ T4615] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 330.356056][ T4615] usb 2-1: device descriptor read/8, error -61 [ 330.625792][ T4615] usb 2-1: new high-speed USB device number 44 using dummy_hcd [ 330.816107][ T4615] usb 2-1: device descriptor read/8, error -61 [ 330.935753][ T4615] usb usb2-port1: unable to enumerate USB device 20:26:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:51 executing program 3: 20:26:51 executing program 2: 20:26:51 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:51 executing program 0: 20:26:51 executing program 4: 20:26:51 executing program 3: 20:26:51 executing program 2: 20:26:51 executing program 4: 20:26:51 executing program 0: 20:26:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001680)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @mcast1}, 0x80, 0x0}}], 0x1, 0x10) 20:26:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0xfffffffffffffead, 0xffffffff, 0xe8, 0x1b8, 0x0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "c44f78ff32228a658aa24760f1e268e224c5530bf0aa83b3ca664f87fa93"}}, {{@ipv6={@dev, @mcast1, [], [], 'bridge_slave_1\x00', 'bond0\x00'}, 0x0, 0xf0, 0x118}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@empty, @remote, [], [], 'bond_slave_1\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x75) [ 331.319274][T20974] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 331.665675][T20487] usb 2-1: new high-speed USB device number 45 using dummy_hcd [ 331.875654][T20487] usb 2-1: device descriptor read/64, error 18 [ 332.145675][T20487] usb 2-1: new high-speed USB device number 46 using dummy_hcd [ 332.335633][T20487] usb 2-1: device descriptor read/64, error 18 [ 332.456751][T20487] usb usb2-port1: attempt power cycle [ 333.165621][T20487] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 333.335605][T20487] usb 2-1: device descriptor read/8, error -61 [ 333.605583][T20487] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 333.775581][T20487] usb 2-1: device descriptor read/8, error -61 [ 333.895746][T20487] usb usb2-port1: unable to enumerate USB device 20:26:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:54 executing program 0: r0 = socket(0x2, 0x3, 0x7) sendmsg$sock(r0, &(0x7f0000000000)={&(0x7f0000000040)=@l2tp={0x2, 0x0, @private}, 0x80, 0x0}, 0x0) 20:26:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x300, 0x400, 0x300, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private1, @private2, [], [], 'wg2\x00', 'bond0\x00'}, 0x0, 0x2d8, 0x300, 0x0, {}, [@common=@unspec=@bpf0={{0x230, 'bpf\x00'}, {0x5, [{}, {0x41ff}]}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'sit0\x00', 'ip6_vti0\x00'}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x600) 20:26:54 executing program 4: r0 = socket(0x1, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @private2}, 0x1c) 20:26:54 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x120, 0x0, 0x20000000}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:26:54 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:54 executing program 2: io_setup(0x1ff, &(0x7f0000000080)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000000)={0x0, 0x989680}) 20:26:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x1, &(0x7f00000000c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000740)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 20:26:54 executing program 4: mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x50830, 0xffffffffffffffff, 0x0) [ 334.321922][T21008] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 334.329442][T21013] x_tables: duplicate underflow at hook 2 20:26:54 executing program 3: r0 = socket(0x2, 0x3, 0x7) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 20:26:54 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 334.515146][T21029] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 334.716828][T20487] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 334.956876][T20487] usb 2-1: Using ep0 maxpacket: 8 [ 335.075530][T20487] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 335.086836][T20487] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 335.097172][T20487] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 335.109516][T20487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 335.120312][T20487] usb 2-1: config 0 descriptor?? [ 335.369185][T20487] usb 2-1: USB disconnect, device number 49 20:26:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:55 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x4, [@struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @array]}, {0x0, [0x0, 0x0]}}, 0x0, 0x11c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:26:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:26:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:26:55 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @array]}, {0x0, [0x0, 0x0]}}, 0x0, 0x64, 0x0, 0x20000000}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:26:55 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:55 executing program 2: r0 = socket(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000001, 0x0) 20:26:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000400)={0x2, 0xf4b0, @private}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xfffffffffffffffd, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}, 0x0) 20:26:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000b80)={&(0x7f0000000400)={0x2, 0xf4b0, @private}, 0x10, 0x0}, 0x240008d4) 20:26:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 335.940565][T21063] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:26:55 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:56 executing program 0: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100), 0xfffffffffffffdbb, 0xfffffffffffffffb) [ 336.142982][T21086] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 336.226503][ T9433] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 336.465459][ T9433] usb 2-1: Using ep0 maxpacket: 8 [ 336.585707][ T9433] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 336.607992][ T9433] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 336.618659][ T9433] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 336.628269][ T9433] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 336.639209][ T9433] usb 2-1: config 0 descriptor?? [ 336.878088][ T4615] usb 2-1: USB disconnect, device number 50 20:26:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:26:57 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_vs\x00') preadv(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/159, 0x9f}], 0x1, 0x800000, 0x0) 20:26:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000000)={0x7, 'vlan0\x00'}) 20:26:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001680)=[{{&(0x7f0000000040)=@in={0x2, 0x4e24, @remote}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="ec1e", 0x2}], 0x1}}], 0x1, 0x0) 20:26:57 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c) 20:26:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x20}, 0x0) 20:26:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:26:57 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) r1 = eventfd(0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, r1}]) [ 337.459577][T21120] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:26:57 executing program 0: fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6) 20:26:57 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 337.698644][T21144] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 337.755846][ T4615] usb 2-1: new high-speed USB device number 51 using dummy_hcd [ 338.035360][ T4615] usb 2-1: Using ep0 maxpacket: 8 [ 338.185371][ T4615] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 338.205342][ T4615] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 338.215229][ T4615] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 338.228586][ T4615] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 338.238611][ T4615] usb 2-1: config 0 descriptor?? [ 338.487711][ T4615] usb 2-1: USB disconnect, device number 51 20:26:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:58 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/12, 0xc}], 0x1, &(0x7f0000000240)=""/190, 0xbe}}], 0x1, 0x0, &(0x7f0000002380)) 20:26:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:26:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x20}, 0x0) 20:26:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0, 0x0) 20:26:58 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:26:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x5) 20:26:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x6, &(0x7f0000000040)={@rand_addr, @broadcast}, 0xc) 20:26:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f00000002c0)="c0", 0x1, 0x0, &(0x7f0000000200)={0x10, 0x2}, 0x10) [ 339.105154][T21175] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:26:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x10, 0x0, 0x0) 20:26:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 339.335332][T20487] usb 2-1: new high-speed USB device number 52 using dummy_hcd [ 339.587850][T20487] usb 2-1: Using ep0 maxpacket: 8 [ 339.705302][T20487] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 339.713886][T20487] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 339.735411][T20487] usb 2-1: config 0 has no interface number 0 [ 339.742465][T20487] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 339.754252][T20487] usb 2-1: config 0 interface 65 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 339.768393][T20487] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 339.778333][T20487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 339.788589][T20487] usb 2-1: config 0 descriptor?? 20:26:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:26:59 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1c1c4e2000000000000000000004"], &(0x7f0000000140)=0x98) 20:26:59 executing program 0: socket$inet(0x2, 0x30000001, 0x0) 20:26:59 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:26:59 executing program 3: rename(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file1\x00') 20:26:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 340.041367][T20487] usb 2-1: USB disconnect, device number 52 20:27:00 executing program 3: open(0x0, 0x490900, 0x0) 20:27:00 executing program 0: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x4001, 0x3, 0x2c8, 0x0, 0x0, 0x148, 0x0, 0x148, 0x230, 0x240, 0x240, 0x230, 0x240, 0x3, 0x0, {[{{@ip={@private, @local, 0x0, 0x0, 'ip6_vti0\x00', 'veth0\x00'}, 0x0, 0x108, 0x138, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'wg1\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@inet=@tcpmss={{0x28, 'tcpmss\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), 0x0) 20:27:00 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xff}) 20:27:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007040)=[{{&(0x7f00000003c0)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001000)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14}}], 0x30}}], 0x1, 0x0) [ 340.137542][T21229] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:27:00 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 340.205071][T21241] Cannot find set identified by id 0 to match [ 340.223421][T21248] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure [ 340.240436][T21241] Cannot find set identified by id 0 to match [ 340.352890][T21254] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 340.515335][T20487] usb 2-1: new high-speed USB device number 53 using dummy_hcd [ 340.755270][T20487] usb 2-1: Using ep0 maxpacket: 8 [ 340.875301][T20487] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 340.884083][T20487] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 340.905275][T20487] usb 2-1: config 0 has no interface number 0 [ 340.912684][T20487] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 340.923400][T20487] usb 2-1: config 0 interface 65 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 340.938016][T20487] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 340.947604][T20487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 340.957197][T20487] usb 2-1: config 0 descriptor?? 20:27:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:01 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000140)=""/129) 20:27:01 executing program 2: 20:27:01 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000040)={'wlan1\x00'}) 20:27:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:01 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 341.211935][ T8121] usb 2-1: USB disconnect, device number 53 20:27:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:01 executing program 0: syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0xfffffffffffffff9, 0x0) 20:27:01 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000) 20:27:01 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) [ 341.312301][T21284] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:27:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:01 executing program 3: ioctl$SNDCTL_SEQ_RESETSAMPLES(0xffffffffffffffff, 0x40045109, 0x0) [ 341.695236][ T8121] usb 2-1: new high-speed USB device number 54 using dummy_hcd [ 341.935193][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 342.056370][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 342.065493][ T8121] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 342.077418][ T8121] usb 2-1: config 0 has no interface number 0 [ 342.083740][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 342.125166][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 342.139312][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 342.149439][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 342.160365][ T8121] usb 2-1: config 0 descriptor?? 20:27:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:02 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:02 executing program 0: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 20:27:02 executing program 2: syz_io_uring_setup(0x348e, &(0x7f0000000180)={0x0, 0xb515, 0x8}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3387, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 20:27:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:02 executing program 3: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x80c0) [ 342.433645][ T8121] usb 2-1: USB disconnect, device number 54 20:27:02 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x20082, 0x0) 20:27:02 executing program 0: io_uring_setup(0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000d00)={0x1, &(0x7f0000000cc0)=[{}]}) 20:27:02 executing program 3: r0 = socket(0xa, 0x3, 0xff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000140)={0x0}}, 0x0) 20:27:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 342.529905][T21337] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:27:02 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', 0x0}) [ 342.679508][T21363] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 342.915193][ T8121] usb 2-1: new high-speed USB device number 55 using dummy_hcd [ 343.165126][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 343.285531][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 343.294778][ T8121] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 343.309387][ T8121] usb 2-1: config 0 has no interface number 0 [ 343.316809][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 343.330288][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 343.344405][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 343.357030][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 343.366997][ T8121] usb 2-1: config 0 descriptor?? 20:27:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:03 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8904, &(0x7f0000000040)={'wlan1\x00'}) 20:27:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:03 executing program 0: syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x0, 0x0) 20:27:03 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000280), 0x960) 20:27:03 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 343.622905][ T8121] usb 2-1: USB disconnect, device number 55 20:27:03 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x80000) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x26000000, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) 20:27:03 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000180)) 20:27:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:03 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8922, &(0x7f0000000040)={'wlan1\x00'}) [ 343.712557][T21398] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:27:03 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:03 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000003400)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000003440)='connect aa:aa:aa:aa:aa:11 0', 0x1b) [ 343.820393][T21414] net_ratelimit: 75 callbacks suppressed [ 343.820398][T21414] wlan1: mtu less than device minimum [ 343.906366][T21416] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 344.105072][ T8121] usb 2-1: new high-speed USB device number 56 using dummy_hcd [ 344.355070][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 344.485105][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 344.497142][ T8121] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 344.508826][ T8121] usb 2-1: config 0 has no interface number 0 [ 344.516928][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 344.528760][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 344.543825][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 344.553718][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 344.567553][ T8121] usb 2-1: config 0 descriptor?? 20:27:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:04 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @mcast1={0xff, 0x0}}}, 0x24) 20:27:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:04 executing program 0: creat(&(0x7f0000000e40)='./file0\x00', 0x0) 20:27:04 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8916, 0x0) 20:27:04 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 344.822469][ T8121] usb 2-1: USB disconnect, device number 56 20:27:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000800)={&(0x7f0000000040), 0xc, &(0x7f00000007c0)={0x0}}, 0x0) 20:27:04 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @mcast1={0xff, 0x0}}}, 0x24) 20:27:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)) [ 344.927436][T21454] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 20:27:04 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:05 executing program 2: socket$inet(0x2, 0x1, 0x80) [ 345.295016][ T8121] usb 2-1: new high-speed USB device number 57 using dummy_hcd [ 345.555008][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 345.675521][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 345.685510][ T8121] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 345.697540][ T8121] usb 2-1: config 0 has no interface number 0 [ 345.703816][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 345.717426][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 345.731510][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 345.744173][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 345.754929][ T8121] usb 2-1: config 0 descriptor?? 20:27:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:05 executing program 3: syz_open_dev$audion(&(0x7f0000000d40)='/dev/audio#\x00', 0x0, 0x200001) 20:27:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:05 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8948, &(0x7f0000000040)={'wlan1\x00'}) 20:27:05 executing program 2: r0 = socket(0xa, 0x3, 0xff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa}, 0xc, &(0x7f0000000140)={0x0}}, 0x0) 20:27:05 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 345.985015][ T8121] Bluetooth: hci5: command 0x0405 tx timeout [ 346.024461][ T8121] usb 2-1: USB disconnect, device number 57 20:27:06 executing program 2: getgroups(0x1, &(0x7f0000000c80)=[0xee01]) 20:27:06 executing program 0: r0 = socket(0x18, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, 0x0, 0x0) 20:27:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:06 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x3}, 0x0, 0x0, 0x0) 20:27:06 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) [ 346.514965][ T8121] usb 2-1: new high-speed USB device number 58 using dummy_hcd [ 346.754969][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 346.874988][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 346.884614][ T8121] usb 2-1: config 0 has no interface number 0 [ 346.920300][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 346.932330][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 346.943518][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 346.958713][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 346.968746][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 346.997421][ T8121] usb 2-1: config 0 descriptor?? [ 347.238601][ T9183] usb 2-1: USB disconnect, device number 58 20:27:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:07 executing program 2: clock_adjtime(0x0, &(0x7f0000000100)={0x7, 0x0, 0xe8d6, 0x0, 0x0, 0x7ff, 0x2, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x6, 0x7ff, 0x0, 0x4, 0x0, 0x0, 0x6, 0xcf, 0x6, 0xecda}) 20:27:07 executing program 3: r0 = socket(0xa, 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000885) 20:27:07 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:07 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) 20:27:07 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) 20:27:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:07 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:07 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001cc0)='/dev/nvme-fabrics\x00', 0x6000, 0x0) 20:27:07 executing program 0: setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) 20:27:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0x541b, 0x0) [ 348.145162][ T4615] usb 2-1: new high-speed USB device number 59 using dummy_hcd [ 348.414881][ T4615] usb 2-1: Using ep0 maxpacket: 8 [ 348.556646][ T4615] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 348.566185][ T4615] usb 2-1: config 0 has no interface number 0 [ 348.572385][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 348.585843][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 348.596861][ T4615] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 348.611244][ T4615] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 348.621460][ T4615] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 348.632707][ T4615] usb 2-1: config 0 descriptor?? [ 348.885309][ T9183] usb 2-1: USB disconnect, device number 59 20:27:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:09 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}}, 0x24) 20:27:09 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff}) 20:27:09 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}}, 0x24) 20:27:09 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:09 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 20:27:09 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}}, 0x24) 20:27:09 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x10000, 0x0) 20:27:09 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:09 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:09 executing program 0: syz_open_dev$audion(&(0x7f00000008c0)='/dev/audio#\x00', 0x0, 0x0) [ 349.766136][ T8121] usb 2-1: new high-speed USB device number 60 using dummy_hcd [ 350.004879][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 350.124902][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 350.132987][ T8121] usb 2-1: config 0 has no interface number 0 [ 350.154887][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 350.166037][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 350.176161][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 350.189560][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 350.199232][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 350.208878][ T8121] usb 2-1: config 0 descriptor?? [ 350.446770][ T8121] usb 2-1: USB disconnect, device number 60 20:27:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f01000000000905830300"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:10 executing program 3: syz_io_uring_setup(0x118c, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x269a, &(0x7f0000000180), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 20:27:10 executing program 2: prctl$PR_GET_PDEATHSIG(0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000180)={0x604, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r1}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x195}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x75}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x148, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xa5c}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r3}, {0x244, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xff}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x604}}, 0x50) r4 = syz_open_dev$audion(&(0x7f00000008c0)='/dev/audio#\x00', 0x8, 0x6500) sendmsg$NL80211_CMD_TESTMODE(r4, &(0x7f0000000c00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000940)={0x280, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TESTDATA={0x34, 0x45, "01e39f2500c9d1d1ca2a87dab052fcf47521618531347b8bf2f9d221d8749bc0a502db0972ebcc2a3b3fe3471383057f"}, @NL80211_ATTR_TESTDATA={0x2e, 0x45, "6b90de79506a458968360ec5b29dd7cac23b4e6d501b55c53f281a7eeac8ab2d9d7d8e02ebc82057feab"}, @NL80211_ATTR_TESTDATA={0xf9, 0x45, "096c6413525e2b74907bb9123b98c9273a4d68babb14483b4c502be071c1c93c81860ee375838fb288435a533cb38a78ef2a3ee60a987c86ee8f577a8297f7044285b3a85cf42716fe48e84e316ba1023326adb71473c014354fc33ae567f61578155ba95eb688a2cc035bc75849f5779f293425e6dbe24b4b46643b73130b2d0f1767296d0f7794c068eb8a83e3a4d17486357fc7ef30aee7e6fd5c781d99d4af3ca5bbc74a596e0f362722ccbd43a9276a907276ccde988a7ff5f7fe1db8e610d6adf5fdf1453765a9d92db95707937d7e0ff055752c9057b7caa2b129a7fd723c9f17e962648ac5d98c764705f19be3284cb64f"}, @NL80211_ATTR_TESTDATA={0x102, 0x45, "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"}]}, 0x280}, 0x1, 0x0, 0x0, 0x4051}, 0x20040000) creat(&(0x7f0000000e40)='./file0\x00', 0x18) 20:27:10 executing program 0: r0 = socket(0xa, 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 20:27:10 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:10 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:10 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:10 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8941, &(0x7f0000000040)={'wlan1\x00'}) 20:27:10 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8929, &(0x7f0000000040)={'wlan1\x00'}) 20:27:11 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:11 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close_range(r0, r1, 0x0) 20:27:11 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 351.294988][ T8121] usb 2-1: new high-speed USB device number 61 using dummy_hcd [ 351.544889][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 351.665389][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 351.673813][ T8121] usb 2-1: config 0 has no interface number 0 [ 351.694897][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 351.706340][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 351.718262][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 351.729208][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 351.743685][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 351.754459][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 351.766355][ T8121] usb 2-1: config 0 descriptor?? [ 351.806397][ T8121] xpad: probe of 2-1:0.65 failed with error -5 [ 352.007837][ T4615] usb 2-1: USB disconnect, device number 61 20:27:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f01000000000905830300"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:12 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8990, &(0x7f0000000040)={'wlan1\x00'}) 20:27:12 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) recvfrom$rxrpc(r0, 0x0, 0x0, 0x10140, 0x0, 0x0) 20:27:12 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:12 executing program 3: r0 = socket(0xa, 0x3, 0xff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x44095) 20:27:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:12 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) 20:27:12 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0xc0045878, 0x0) [ 352.582834][T21735] ISOFS: Logical zone size(0) < hardware blocksize(1024) 20:27:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:12 executing program 0: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x3}, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 20:27:12 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 352.864961][ T8121] usb 2-1: new high-speed USB device number 62 using dummy_hcd [ 353.104904][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 353.224902][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 353.233079][ T8121] usb 2-1: config 0 has no interface number 0 [ 353.254939][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 353.265943][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 353.277182][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 353.287040][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 353.300145][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 353.309345][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 353.320095][ T8121] usb 2-1: config 0 descriptor?? [ 353.366771][ T8121] xpad: probe of 2-1:0.65 failed with error -5 [ 353.577841][ T8121] usb 2-1: USB disconnect, device number 62 20:27:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f01000000000905830300"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:14 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0xc0045878, 0x0) 20:27:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:14 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x15f, &(0x7f0000000840)={0x0, 0x91d7}) 20:27:14 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0x5451, 0x0) 20:27:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 20:27:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="480000001400e702cc13095f9f95274b0a0605845865400440010000000000007fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b", 0x48}], 0x1}, 0x0) 20:27:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 354.177801][T21787] ISOFS: Logical zone size(0) < hardware blocksize(1024) 20:27:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000200)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x0, 0x0, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast, @bcast]}) 20:27:14 executing program 0: r0 = epoll_create(0x3) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100), r1, &(0x7f0000000140), 0x0, 0x0) [ 354.444887][ T8121] usb 2-1: new high-speed USB device number 63 using dummy_hcd [ 354.696122][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 354.824938][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 354.833229][ T8121] usb 2-1: config 0 has no interface number 0 [ 354.854886][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 354.866521][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 354.878162][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 354.888571][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 354.902310][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 354.912056][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 354.923992][ T8121] usb 2-1: config 0 descriptor?? [ 354.966765][ T8121] xpad: probe of 2-1:0.65 failed with error -5 [ 355.168422][ T8121] usb 2-1: USB disconnect, device number 63 20:27:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:15 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890b, &(0x7f0000000040)={'wlan1\x00'}) 20:27:15 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:15 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x8000000) 20:27:15 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)='cgroup.subtree_control\x00', 0x2, 0x0) 20:27:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:15 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, &(0x7f0000000d40)=0x8) 20:27:15 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400101) 20:27:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:15 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, 0x0) [ 355.742586][T21844] ISOFS: Logical zone size(0) < hardware blocksize(1024) 20:27:15 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000100", 0x78, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:15 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, &(0x7f0000000d40)) [ 355.973895][T21868] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 356.026394][ T4615] usb 2-1: new high-speed USB device number 64 using dummy_hcd [ 356.286417][ T4615] usb 2-1: Using ep0 maxpacket: 8 [ 356.436629][ T4615] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 356.448723][ T4615] usb 2-1: config 0 has no interface number 0 [ 356.462828][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 356.487705][ T4615] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 356.499711][ T4615] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 356.513373][ T4615] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 356.523048][ T4615] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 356.532226][ T4615] usb 2-1: config 0 descriptor?? [ 356.810574][ T4615] usb 2-1: USB disconnect, device number 64 [ 356.816540][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 356.816564][ C0] xpad 2-1:0.65: xpad_irq_out - usb_submit_urb failed with result -19 20:27:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:17 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0x88501) 20:27:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:17 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getgroups(0x0, 0x0) creat(&(0x7f0000000e40)='./file0\x00', 0x18) 20:27:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0xb, 0x101}, 0x14}}, 0x0) 20:27:17 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000100", 0x78, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:17 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8902, 0x0) 20:27:17 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000140)) 20:27:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 357.389142][T21906] ISOFS: Logical zone size(0) < hardware blocksize(1024) 20:27:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:17 executing program 2: time(&(0x7f0000000d80)) 20:27:17 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0x4020940d, 0x0) [ 357.674876][ T9433] usb 2-1: new high-speed USB device number 65 using dummy_hcd [ 357.914909][ T9433] usb 2-1: Using ep0 maxpacket: 8 [ 358.034908][ T9433] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 358.043099][ T9433] usb 2-1: config 0 has no interface number 0 [ 358.064914][ T9433] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 358.079371][ T9433] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 358.091171][ T9433] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 358.105053][ T9433] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 358.114078][ T9433] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 358.124094][ T9433] usb 2-1: config 0 descriptor?? [ 358.389089][ T9433] usb 2-1: USB disconnect, device number 65 [ 358.404879][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:27:18 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000100", 0x78, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:18 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x2c001, 0x0) 20:27:18 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 20:27:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x8, &(0x7f0000000100)=@generic={0x8, 0x0, 0x0, "176896e7"}) 20:27:18 executing program 0: socket(0x2, 0x0, 0x8000) 20:27:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:18 executing program 3: syz_open_dev$dri(&(0x7f00000004c0)='/dev/dri/card#\x00', 0x1, 0x4001) 20:27:18 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x85c5}) 20:27:18 executing program 0: syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x40) 20:27:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:18 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) [ 358.985720][T21962] ISOFS: Logical zone size(0) < hardware blocksize(1024) 20:27:19 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:19 executing program 0: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x8) 20:27:19 executing program 3: r0 = socket(0x18, 0x0, 0x2) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c}}, 0x0) 20:27:19 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{{0x9, 0x5, 0x81, 0x3, 0x50}}]}}}]}}]}}, 0x0) [ 359.204679][T21984] isofs_fill_super: root inode is not a directory. Corrupted media? [ 359.264982][ T9183] usb 2-1: new high-speed USB device number 66 using dummy_hcd [ 359.544900][ T9183] usb 2-1: Using ep0 maxpacket: 8 [ 359.604937][ T7] usb 3-1: new high-speed USB device number 12 using dummy_hcd [ 359.685284][ T9183] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 359.694785][ T9183] usb 2-1: config 0 has no interface number 0 [ 359.702123][ T9183] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 359.715253][ T9183] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 359.728786][ T9183] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 359.742580][ T9183] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 359.753863][ T9183] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.764769][ T9183] usb 2-1: config 0 descriptor?? [ 359.864932][ T7] usb 3-1: Using ep0 maxpacket: 16 [ 360.006762][ T7] usb 3-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 0 [ 360.034194][ T9183] usb 2-1: USB disconnect, device number 66 [ 360.040156][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 360.040179][ C0] xpad 2-1:0.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 360.226932][ T7] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 360.237789][ T7] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 360.246945][ T7] usb 3-1: Product: syz [ 360.251209][ T7] usb 3-1: Manufacturer: syz [ 360.257280][ T7] usb 3-1: SerialNumber: syz [ 360.305485][ T7] cdc_ether: probe of 3-1:1.0 failed with error -22 20:27:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x0, 0x0) 20:27:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000980)={0x2c, 0x0, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_CLASS={0x8}]}, 0x2c}}, 0x0) 20:27:20 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:20 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, 0x0) [ 360.519998][ T7] usb 3-1: USB disconnect, device number 12 20:27:20 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8991, &(0x7f0000000040)={'wlan1\x00'}) 20:27:20 executing program 0: r0 = socket(0xa, 0x3, 0xff) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, 0x0, 0x0) 20:27:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 360.604218][T22033] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:20 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:20 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 20:27:20 executing program 0: move_pages(0x0, 0x1, &(0x7f0000000500)=[&(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000540), &(0x7f0000000580), 0x0) [ 360.804744][T22054] isofs_fill_super: root inode is not a directory. Corrupted media? [ 360.865144][ T9183] usb 2-1: new high-speed USB device number 67 using dummy_hcd [ 361.114888][ T9183] usb 2-1: Using ep0 maxpacket: 8 [ 361.254899][ T9183] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 361.263137][ T9183] usb 2-1: config 0 has no interface number 0 [ 361.275055][ T9183] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 361.286590][ T9183] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 361.298087][ T9183] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 361.311588][ T7] usb 3-1: new high-speed USB device number 13 using dummy_hcd [ 361.319200][ T9183] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 361.328817][ T9183] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 361.338308][ T9183] usb 2-1: config 0 descriptor?? [ 361.594917][ T7] usb 3-1: Using ep0 maxpacket: 16 [ 361.755415][ T7] usb 3-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 0 [ 361.788259][ T4615] usb 2-1: USB disconnect, device number 67 [ 361.794995][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 361.944892][ T7] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 361.954048][ T7] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 361.962111][ T7] usb 3-1: Product: syz [ 361.966472][ T7] usb 3-1: Manufacturer: syz [ 361.971113][ T7] usb 3-1: SerialNumber: syz [ 362.025479][ T7] cdc_ether: probe of 3-1:1.0 failed with error -22 20:27:22 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8923, &(0x7f0000000040)={'wlan1\x00'}) [ 362.234996][ T4615] usb 3-1: USB disconnect, device number 13 20:27:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x0, 0x0) 20:27:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:22 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000040)={'wlan1\x00'}) 20:27:22 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 20:27:22 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000100010000010100000100080800180000000000001814000000210000000000", 0x96, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:22 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x92642, 0x0) 20:27:22 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 20:27:22 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8993, &(0x7f0000000040)={'wlan1\x00'}) 20:27:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "a6866b34160fd9abea3c21859eb7e6405889b30fb52d69580f12351bedf46b30", "ea92a531387d78f22268b1882ef2d4528e9899a53d411db86b68445d27dc709c"}}}]}, 0x268}}, 0x0) [ 362.390118][T22104] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:22 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000100010000010100000100080800180000000000001814000000210000000000", 0x96, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:22 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x10be40, 0x0) [ 362.601838][T22133] isofs_fill_super: root inode is not a directory. Corrupted media? [ 362.634906][T20487] usb 2-1: new high-speed USB device number 68 using dummy_hcd [ 362.876155][T20487] usb 2-1: Using ep0 maxpacket: 8 [ 362.994925][T20487] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 363.003176][T20487] usb 2-1: config 0 has no interface number 0 [ 363.009994][T20487] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 363.021120][T20487] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 363.032898][T20487] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 363.047136][T20487] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 363.056728][T20487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 363.066807][T20487] usb 2-1: config 0 descriptor?? [ 363.506534][T20487] usb 2-1: USB disconnect, device number 68 [ 363.524917][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:27:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x0, 0x0) 20:27:23 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 20:27:23 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x410001, 0x0) 20:27:23 executing program 2: syz_open_dev$binderN(0x0, 0x0, 0x0) 20:27:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:23 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000100010000010100000100080800180000000000001814000000210000000000", 0x96, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:24 executing program 2: io_uring_setup(0x15f, &(0x7f0000000840)={0x0, 0x91d7, 0x30, 0x2, 0x304}) syz_open_dev$audion(&(0x7f00000008c0)='/dev/audio#\x00', 0x8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000d00)={0x1, &(0x7f0000000cc0)=[{0xac9e, 0x0, 0x9, 0x8}]}) 20:27:24 executing program 3: syz_open_dev$usbmon(&(0x7f0000000940)='/dev/usbmon#\x00', 0x0, 0x0) 20:27:24 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x18da00, 0x0) 20:27:24 executing program 0: keyctl$set_reqkey_keyring(0xe, 0x1) setresuid(0xee01, 0xee01, 0x0) [ 364.103650][T22162] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:24 executing program 3: io_uring_setup(0x579a, &(0x7f00000002c0)={0x0, 0xdf25, 0x8}) [ 364.385647][T20487] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 364.624893][T20487] usb 2-1: Using ep0 maxpacket: 8 [ 364.744905][T20487] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 364.753831][T20487] usb 2-1: config 0 has no interface number 0 [ 364.761094][T20487] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 364.774666][T20487] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 364.786684][T20487] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 364.800462][T20487] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 364.810739][T20487] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 364.822482][T20487] usb 2-1: config 0 descriptor?? [ 365.270719][ T9433] usb 2-1: USB disconnect, device number 69 [ 365.284894][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:27:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x0, 0x0, 0x0, "176896e7"}) 20:27:25 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018140000002100000000000016000000", 0x9b, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:25 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x2, {0x2, 0x0, @local}}, 0x24) 20:27:25 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x894a, &(0x7f0000000040)={'wlan1\x00'}) 20:27:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 20:27:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000cc0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000007"], 0x40}}, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:27:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="210129bd7000fbdbdf254f"], 0x1c}}, 0x0) 20:27:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:25 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x8, 0x1, 0xffffffffffffffff}) [ 365.856059][T22228] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:25 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018140000002100000000000016000000", 0x9b, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:25 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) mmap$snddsp_status(&(0x7f0000ffa000/0x6000)=nil, 0x1000, 0x0, 0x10, r0, 0x82000000) [ 365.901603][T22233] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 365.918369][T22233] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 366.061559][T22249] isofs_fill_super: root inode is not a directory. Corrupted media? [ 366.114879][ T9433] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 366.355198][ T9433] usb 2-1: Using ep0 maxpacket: 8 [ 366.475337][ T9433] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 366.486834][ T9433] usb 2-1: config 0 has no interface number 0 [ 366.500051][ T9433] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 366.528530][ T9433] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 366.550590][ T9433] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 366.564819][ T9433] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 366.574325][ T9433] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 366.586126][ T9433] usb 2-1: config 0 descriptor?? [ 367.026986][ T9433] usb 2-1: USB disconnect, device number 70 [ 367.044962][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:27:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x0, 0x0, 0x0, "176896e7"}) 20:27:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:27 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2002, 0x0) 20:27:27 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 20:27:27 executing program 0: syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x6, 0x80, 0x3f, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x2}}}}}]}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) 20:27:27 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018140000002100000000000016000000", 0x9b, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, 0x0, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, 0x0, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:27 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0xfffffee3, {0xa, 0x0, 0x0, @private1}}, 0x24) 20:27:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, 0x0, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 367.635250][T22286] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:27 executing program 2: io_uring_setup(0x10bb, &(0x7f0000000240)) io_uring_setup(0x579a, &(0x7f00000002c0)={0x0, 0xdf25, 0x8}) 20:27:27 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 367.819952][T22312] isofs_fill_super: root inode is not a directory. Corrupted media? [ 367.884894][ T8121] usb 2-1: new high-speed USB device number 71 using dummy_hcd [ 367.892569][ T9433] usb 1-1: new full-speed USB device number 9 using dummy_hcd [ 368.145254][ T8121] usb 2-1: Using ep0 maxpacket: 8 [ 368.264966][ T9433] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 368.278394][ T8121] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 368.294894][ T8121] usb 2-1: config 0 has no interface number 0 [ 368.300990][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 368.324304][ T8121] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 368.335373][ T8121] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 368.348452][ T8121] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 368.357695][ T8121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 368.371831][ T8121] usb 2-1: config 0 descriptor?? [ 368.474938][ T9433] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 368.486834][ T9433] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 368.495731][ T9433] usb 1-1: Product: syz [ 368.501525][ T9433] usb 1-1: Manufacturer: syz [ 368.508135][ T9433] usb 1-1: SerialNumber: syz [ 368.795357][ T9433] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 368.810228][ T9433] usb 1-1: USB disconnect, device number 9 [ 368.827010][ T8121] usb 2-1: USB disconnect, device number 71 [ 368.834875][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:27:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000100)=@generic={0x0, 0x0, 0x0, "176896e7"}) 20:27:29 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x201, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) 20:27:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:29 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) [ 369.544878][ T4615] usb 1-1: new full-speed USB device number 10 using dummy_hcd [ 369.654915][ T9433] usb 2-1: new high-speed USB device number 72 using dummy_hcd [ 369.894879][ T9433] usb 2-1: Using ep0 maxpacket: 8 [ 369.944900][ T4615] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 370.015502][ T9433] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 370.023589][ T9433] usb 2-1: config 0 has no interface number 0 [ 370.030817][ T9433] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 370.042122][ T9433] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 370.054459][ T9433] usb 2-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 370.068973][ T9433] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 370.078594][ T9433] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 370.088618][ T9433] usb 2-1: config 0 descriptor?? [ 370.165310][ T4615] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 370.174342][ T4615] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 370.194857][ T4615] usb 1-1: Product: syz [ 370.199051][ T4615] usb 1-1: Manufacturer: syz [ 370.203643][ T4615] usb 1-1: SerialNumber: syz 20:27:30 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) 20:27:30 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:30 executing program 2: syz_io_uring_setup(0x348e, &(0x7f0000000180)={0x0, 0xb515, 0x8}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_setup(0x3387, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 20:27:30 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) fcntl$lock(r0, 0x0, 0x0) [ 370.495530][ T4615] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 370.515816][ T4615] usb 1-1: USB disconnect, device number 10 [ 370.535456][T22393] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:30 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+'}, 0x16, 0x0) 20:27:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 370.543894][T19635] usb 2-1: USB disconnect, device number 72 [ 370.554869][ C1] xpad 2-1:0.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 370.563041][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 20:27:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)={0x4bc, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "404dfca688da79536839b8e49b0e79736b048795a05960033a2e1291bc183e42", "23aa14c7898dcaaf8a5f60cdd12707a1919739bd1c881befeb4579ca8010ac3f"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "a6866b34160fd9abea3c21859eb7e6405889b30fb52d69580f12351bedf46b30", "ea92a531387d78f22268b1882ef2d4528e9899a53d411db86b68445d27dc709c"}}}]}, 0x4bc}}, 0x0) 20:27:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)={0x4bc, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "404dfca688da79536839b8e49b0e79736b048795a05960033a2e1291bc183e42", "23aa14c7898dcaaf8a5f60cdd12707a1919739bd1c881befeb4579ca8010ac3f"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "a6866b34160fd9abea3c21859eb7e6405889b30fb52d69580f12351bedf46b30", "ea92a531387d78f22268b1882ef2d4528e9899a53d411db86b68445d27dc709c"}}}]}, 0x4bc}}, 0x0) 20:27:30 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) 20:27:30 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:30 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8906, 0x0) 20:27:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, 0x0, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:30 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20}}, {{0x9, 0x5, 0x3, 0x2, 0x20}}}}}]}}]}}, 0x0) 20:27:31 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 20:27:31 executing program 1: r0 = socket(0xa, 0x3, 0xff) accept4$tipc(r0, 0x0, 0x0, 0x0) 20:27:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, 0x0, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:31 executing program 0: openat$drirender128(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0x80, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x2, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x0, 0x0, 0x8, 0x5}}, [{{0x9, 0x5, 0x82, 0x2, 0x0, 0x7, 0x40}}]}}}]}}]}}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x0, 0x0}, {0x64, &(0x7f0000000280)=@string={0x64, 0x3, "0d2e1a4dfb7dffd5ac5fa312326b6bfe55dd5ddd956369fb7cae56def3bc433e3314c240b9e243dd1a5fe0538d4219809edf68210bfce63791caad9295b73438d547ea6756ea494c6b02a3813f4cc745db20d88a3f9b7199138822f4b78f4a4911d7"}}]}) 20:27:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, 0x0, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 371.166667][T22449] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:31 executing program 1: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0}, 0x0) getgroups(0x0, &(0x7f0000000c80)) 20:27:31 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018140000002100000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:31 executing program 2: clock_adjtime(0x0, &(0x7f0000000000)={0x1ff, 0x7, 0x0, 0x0, 0x2519, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x1ff, 0x7d89, 0x4, 0x8, 0x0, 0x8, 0x5, 0x5, 0x800, 0x85c5, 0xffffffffffffff01, 0x80}) 20:27:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:31 executing program 1: clock_adjtime(0x0, &(0x7f0000000000)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}) 20:27:31 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x20}}}}}]}}]}}, 0x0) [ 371.360141][T22473] isofs_fill_super: root inode is not a directory. Corrupted media? [ 371.426810][ T4615] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 371.554912][ T7] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 371.676604][ T4615] usb 4-1: Using ep0 maxpacket: 16 [ 371.764901][ T8121] usb 3-1: new high-speed USB device number 14 using dummy_hcd [ 371.795256][ T4615] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 371.818102][ T4615] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 32 [ 372.004874][ T8121] usb 3-1: Using ep0 maxpacket: 16 [ 372.025229][ T7] usb 1-1: unable to get BOS descriptor or descriptor too short [ 372.032927][ T4615] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 372.046467][ T4615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 372.054468][ T4615] usb 4-1: Product: syz [ 372.059266][ T4615] usb 4-1: Manufacturer: syz [ 372.063884][ T4615] usb 4-1: SerialNumber: syz [ 372.095797][T22448] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 372.103941][T22448] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 372.115279][ T7] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 372.125011][ T8121] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 372.141401][ T8121] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 372.153235][ T8121] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 32 [ 372.315312][ T8121] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 372.325061][ T8121] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 372.333208][ T8121] usb 3-1: Product: syz [ 372.337976][ T8121] usb 3-1: Manufacturer: syz [ 372.342728][ T8121] usb 3-1: SerialNumber: syz [ 372.356584][ T4615] cdc_ether: probe of 4-1:1.0 failed with error -71 [ 372.366296][T22482] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 372.374948][ T7] usb 1-1: string descriptor 0 read error: -22 [ 372.381278][ T7] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 372.385472][ T8121] cdc_ether: probe of 3-1:1.0 failed with error -22 [ 372.396151][ T4615] usb 4-1: USB disconnect, device number 6 [ 372.434953][ T7] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 372.607710][ T8121] usb 3-1: USB disconnect, device number 14 [ 372.707223][T19635] usb 1-1: USB disconnect, device number 11 [ 373.115022][ T4615] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 373.374891][ T4615] usb 4-1: Using ep0 maxpacket: 16 [ 373.405206][ T7] usb 3-1: new high-speed USB device number 15 using dummy_hcd [ 373.525281][ T4615] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 373.544106][ T4615] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 32 [ 373.675466][ T7] usb 3-1: Using ep0 maxpacket: 16 [ 373.714936][ T4615] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 373.724038][ T4615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 373.734997][ T4615] usb 4-1: Product: syz [ 373.739212][ T4615] usb 4-1: Manufacturer: syz [ 373.743867][ T4615] usb 4-1: SerialNumber: syz [ 373.776185][T22448] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 373.783286][T22448] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 373.816273][ T7] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 373.826086][ T7] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 373.836231][ T7] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 32 20:27:33 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x3}, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x7]}, 0x8}) 20:27:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)={0x14, 0x3, 0x6, 0x401}, 0x14}}, 0x0) 20:27:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:33 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018140000002100000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:33 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, 0x24) [ 374.004939][ T4615] cdc_ether: probe of 4-1:1.0 failed with error -71 [ 374.008092][ T7] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 374.021454][ T4615] usb 4-1: USB disconnect, device number 7 [ 374.073082][ T7] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 374.108697][ T7] usb 3-1: Product: syz 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000001d40)='team\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/8, 0x8) 20:27:34 executing program 1: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000300)={'ip6tnl0\x00', 0x0}) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 374.117480][T22548] isofs_fill_super: root inode is not a directory. Corrupted media? [ 374.131073][ T7] usb 3-1: Manufacturer: syz [ 374.142164][ T7] usb 3-1: SerialNumber: syz 20:27:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {0x7}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 20:27:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000001000100000101000001000808001800000000000018140000002100000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 374.186493][T22482] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 374.206852][ T7] cdc_ether: probe of 3-1:1.0 failed with error -22 [ 374.321247][T22572] isofs_fill_super: root inode is not a directory. Corrupted media? 20:27:34 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x0) 20:27:34 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000040), 0xffffffffffffff49) 20:27:34 executing program 1: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8994, &(0x7f0000000040)={'wlan1\x00'}) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0x40305829, 0x0) 20:27:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) [ 374.425611][ T7] usb 3-1: USB disconnect, device number 15 20:27:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x26000000, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) 20:27:34 executing program 1: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8949, &(0x7f0000000040)={'wlan1\x00'}) 20:27:34 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8981, &(0x7f0000000040)={'wlan1\x00'}) 20:27:34 executing program 3: move_pages(0x0, 0x1, &(0x7f0000000500)=[&(0x7f0000ffc000/0x4000)=nil], 0x0, &(0x7f0000000580), 0x0) 20:27:34 executing program 0: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4020940d, &(0x7f0000000040)={'wlan1\x00'}) 20:27:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:34 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8971, &(0x7f0000000040)={'wlan1\x00'}) 20:27:34 executing program 1: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8980, &(0x7f0000000040)={'wlan1\x00'}) 20:27:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000b80)={&(0x7f0000000940), 0xc, &(0x7f0000000b40)={0x0}}, 0x0) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, 0x0, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 0: keyctl$set_reqkey_keyring(0xe, 0x5) 20:27:34 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) 20:27:34 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) 20:27:34 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x200002, 0x0) 20:27:34 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_THRESHOLD(r0, 0x4004510d, 0x0) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, 0x0, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0xc0189436, &(0x7f0000000140)) 20:27:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@ssrr={0x89, 0x3}]}}}}}) 20:27:34 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, 0x0, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/sequencer2\x00', 0x0, 0x0) 20:27:34 executing program 2: sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000c40)) 20:27:34 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 20:27:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:34 executing program 1: syz_usb_connect$cdc_ecm(0x2, 0x56, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{}]}}}]}}]}}, 0x0) 20:27:35 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:35 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000001340), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 20:27:35 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0xa202, 0x0) 20:27:35 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:35 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0x40305828, 0x0) 20:27:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:35 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000a80)) 20:27:35 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x0) 20:27:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:35 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:35 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8940, &(0x7f0000000040)={'wlan1\x00'}) [ 375.425561][T19635] usb 2-1: new full-speed USB device number 73 using dummy_hcd [ 375.814929][T19635] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 375.835721][T19635] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 375.855423][T19635] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 375.875052][T19635] usb 2-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 376.055369][T19635] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 376.076323][T19635] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 376.086810][T19635] usb 2-1: Product: syz [ 376.091067][T19635] usb 2-1: Manufacturer: syz [ 376.121581][T19635] usb 2-1: SerialNumber: syz [ 376.175484][T19635] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 376.378951][ T4615] usb 2-1: USB disconnect, device number 73 [ 377.164885][ T4615] usb 2-1: new full-speed USB device number 74 using dummy_hcd [ 377.535165][ T4615] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 377.554935][ T4615] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 377.566711][ T4615] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 377.577207][ T4615] usb 2-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 377.775324][ T4615] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 377.784574][ T4615] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 377.793430][ T4615] usb 2-1: Product: syz [ 377.798353][ T4615] usb 2-1: Manufacturer: syz [ 377.803291][ T4615] usb 2-1: SerialNumber: syz [ 377.865323][ T4615] cdc_ether: probe of 2-1:1.0 failed with error -22 20:27:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 20:27:38 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)) 20:27:38 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, 0x0) 20:27:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) [ 378.079801][ T4615] usb 2-1: USB disconnect, device number 74 20:27:38 executing program 0: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000600)=[{}], 0x1, 0x0, &(0x7f0000000680), 0x8) 20:27:38 executing program 2: syz_io_uring_setup(0x62bb, &(0x7f0000001340), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000013c0), &(0x7f0000001400)) 20:27:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 20:27:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) 20:27:38 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) 20:27:38 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 20:27:38 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891f, &(0x7f0000000040)={'wlan1\x00'}) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) 20:27:38 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 20:27:38 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e27, @empty}}, 0x24) 20:27:38 executing program 3: socket(0x22, 0x3, 0x0) 20:27:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:38 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) 20:27:38 executing program 1: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89e1, &(0x7f0000000040)={'wlan1\x00'}) 20:27:38 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/input/mice\x00', 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0x541b, 0x0) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 2: clock_adjtime(0x0, &(0x7f0000000000)={0x1ff, 0x7, 0xfff, 0x8, 0x2519, 0x0, 0x0, 0x0, 0x9, 0x20, 0xb47, 0x2, 0x4, 0x800, 0x0, 0x7d89, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0xffffffffffffff01, 0x80}) 20:27:38 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a1, 0x0) 20:27:38 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a7"}) 20:27:38 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) getgroups(0x0, 0x0) creat(&(0x7f0000000e40)='./file0\x00', 0x18) 20:27:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @mcast1, 0x6}}, 0x24) 20:27:38 executing program 2: syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') syz_io_uring_setup(0x62bb, &(0x7f0000001340)={0x0, 0x0, 0x20, 0x0, 0x117}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000013c0), &(0x7f0000001400)) 20:27:38 executing program 1: openat$drirender128(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0x80, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x2, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x3ff, 0x9, 0x8, 0x5}}, [{{0x9, 0x5, 0x82, 0x2, 0x400, 0x7, 0x0, 0x20}}]}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x250, 0x6, 0x9c, 0x3, 0xdf, 0xe9}, 0x11, &(0x7f0000000140)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc, 0x10, 0xa, 0x4}]}, 0x5, [{0x4, &(0x7f0000000180)=@lang_id={0x4}}, {0x0, 0x0}, {0x32, &(0x7f0000000200)=@string={0x32, 0x3, "28f0466b46fdc47bea6f3493d047d31296577dc85f32f04c2c6fdd1f4a3e90fd230beaa4448d9a2100ffefd184b55760"}}, {0x2, &(0x7f0000000280)=@string={0x2}}, {0x6a, &(0x7f0000000380)=@string={0x6a, 0x3, "9ed69394a719277f41ec1ab39c232a928bca15445f9d1f0319057f9eddeae09dbfad6d1e2514f1682ecc896793fd3577fa91bee18d04cd5e4f3f0538236700db78f09659ce87e6adeff74fcd11b971fbf885fa38d044131179f53da3af719e78d9aab3dd803756b5"}}]}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 20:27:38 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:38 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r0, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) 20:27:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:38 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8943, &(0x7f0000000040)={'wlan1\x00'}) 20:27:38 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dri/renderD128\x00', 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) 20:27:38 executing program 3: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8918, &(0x7f0000000040)={'wlan1\x00'}) 20:27:39 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:39 executing program 2: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891d, &(0x7f0000000040)={'wlan1\x00'}) [ 379.154953][T19635] usb 2-1: new high-speed USB device number 75 using dummy_hcd [ 379.605237][T19635] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1023 [ 379.624949][T19635] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1024 [ 380.006775][T19635] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 380.025859][T19635] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 380.044882][T19635] usb 2-1: Product: 歆﵆範濪錴äŸá‹“垖졽㉟䳰漬á¿ã¹Šï¶à¬£ê“ªèµ„â†šï¼€í‡¯ë–„æ— [ 380.075750][T22821] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 380.082721][T22821] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 380.356122][T19635] usblp: can't set desired altsetting 0 on interface 0 [ 380.366809][T19635] usb 2-1: USB disconnect, device number 75 20:27:40 executing program 1: 20:27:40 executing program 0: syz_io_uring_setup(0x1a7e, &(0x7f0000000100)={0x0, 0x798b, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3837, &(0x7f0000000000), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 20:27:40 executing program 3: 20:27:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:40 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:40 executing program 2: 20:27:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:40 executing program 2: 20:27:40 executing program 3: 20:27:40 executing program 2: 20:27:40 executing program 1: 20:27:40 executing program 3: 20:27:40 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) getdents64(r0, 0x0, 0x0) 20:27:40 executing program 0: 20:27:40 executing program 1: 20:27:40 executing program 3: 20:27:40 executing program 2: 20:27:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:41 executing program 2: 20:27:41 executing program 0: 20:27:41 executing program 1: 20:27:41 executing program 3: 20:27:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 20:27:41 executing program 2: 20:27:41 executing program 3: 20:27:41 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2, &(0x7f0000000300)=@string={0x2}}]}) 20:27:41 executing program 1: 20:27:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 20:27:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) 20:27:41 executing program 3: 20:27:41 executing program 1: 20:27:41 executing program 2: 20:27:41 executing program 1: 20:27:41 executing program 3: 20:27:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae0000200000000000000000ed", 0x95, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 20:27:41 executing program 3: 20:27:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 381.665285][T19635] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 381.915365][T19635] usb 1-1: Using ep0 maxpacket: 16 [ 382.035232][T19635] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 382.095200][T19635] usb 1-1: language id specifier not provided by device, defaulting to English [ 382.227128][T19635] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 382.243936][T19635] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 382.274051][T19635] usb 1-1: Product: syz [ 382.300266][T19635] usb 1-1: Manufacturer: syz [ 382.311414][T19635] usb 1-1: SerialNumber: syz [ 382.375401][T19635] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 382.577401][T19635] usb 1-1: USB disconnect, device number 12 [ 383.355606][T19635] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 383.604945][T19635] usb 1-1: Using ep0 maxpacket: 16 [ 383.725300][T19635] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 383.785176][T19635] usb 1-1: language id specifier not provided by device, defaulting to English [ 383.915207][T19635] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 383.933140][T19635] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 383.954922][T19635] usb 1-1: Product: syz [ 383.959080][T19635] usb 1-1: Manufacturer: syz [ 383.963691][T19635] usb 1-1: SerialNumber: syz [ 384.015370][T19635] cdc_ether: probe of 1-1:1.0 failed with error -22 20:27:44 executing program 0: 20:27:44 executing program 2: 20:27:44 executing program 1: 20:27:44 executing program 5: 20:27:44 executing program 3: 20:27:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)="d0", 0x1}], 0x1}, 0x0) [ 384.215490][T19635] usb 1-1: USB disconnect, device number 13 20:27:44 executing program 1: 20:27:44 executing program 5: 20:27:44 executing program 2: 20:27:44 executing program 3: 20:27:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, 0x0, 0x0) 20:27:44 executing program 0: 20:27:44 executing program 5: 20:27:44 executing program 2: 20:27:44 executing program 0: 20:27:44 executing program 1: 20:27:44 executing program 3: 20:27:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, 0x0, 0x0) 20:27:44 executing program 5: 20:27:44 executing program 1: 20:27:44 executing program 3: 20:27:44 executing program 2: 20:27:44 executing program 0: 20:27:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, 0x0, 0x0) 20:27:44 executing program 5: 20:27:44 executing program 1: 20:27:44 executing program 3: 20:27:44 executing program 0: 20:27:44 executing program 5: 20:27:44 executing program 2: 20:27:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 20:27:44 executing program 1: 20:27:44 executing program 3: 20:27:44 executing program 0: 20:27:44 executing program 5: 20:27:44 executing program 2: 20:27:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 20:27:44 executing program 3: 20:27:44 executing program 0: 20:27:44 executing program 5: 20:27:44 executing program 1: 20:27:44 executing program 2: 20:27:44 executing program 0: 20:27:44 executing program 3: 20:27:44 executing program 1: 20:27:44 executing program 5: 20:27:45 executing program 2: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 20:27:45 executing program 0: 20:27:45 executing program 5: 20:27:45 executing program 1: 20:27:45 executing program 2: 20:27:45 executing program 3: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)}, 0x0) 20:27:45 executing program 0: 20:27:45 executing program 5: 20:27:45 executing program 3: 20:27:45 executing program 1: 20:27:45 executing program 2: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)}, 0x0) 20:27:45 executing program 5: 20:27:45 executing program 3: 20:27:45 executing program 0: 20:27:45 executing program 1: 20:27:45 executing program 2: 20:27:45 executing program 5: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)}, 0x0) 20:27:45 executing program 3: 20:27:45 executing program 0: 20:27:45 executing program 1: 20:27:45 executing program 5: 20:27:45 executing program 2: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}], 0x1}, 0x0) 20:27:45 executing program 3: 20:27:45 executing program 0: 20:27:45 executing program 1: 20:27:45 executing program 5: 20:27:45 executing program 2: 20:27:45 executing program 0: 20:27:45 executing program 1: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}], 0x1}, 0x0) 20:27:45 executing program 5: 20:27:45 executing program 3: 20:27:45 executing program 2: 20:27:45 executing program 0: 20:27:45 executing program 5: 20:27:45 executing program 1: 20:27:45 executing program 2: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}], 0x1}, 0x0) 20:27:45 executing program 3: 20:27:45 executing program 0: 20:27:45 executing program 1: 20:27:45 executing program 5: 20:27:45 executing program 2: 20:27:45 executing program 3: 20:27:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)}], 0x1}, 0x0) 20:27:46 executing program 0: 20:27:46 executing program 5: 20:27:46 executing program 1: 20:27:46 executing program 2: 20:27:46 executing program 3: 20:27:46 executing program 0: 20:27:46 executing program 5: 20:27:46 executing program 1: 20:27:46 executing program 3: 20:27:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)}], 0x1}, 0x0) 20:27:46 executing program 2: 20:27:46 executing program 1: 20:27:46 executing program 0: 20:27:46 executing program 3: 20:27:46 executing program 5: 20:27:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x2004c880) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000d00)}], 0x1}, 0x0) 20:27:46 executing program 2: 20:27:46 executing program 1: 20:27:46 executing program 0: 20:27:46 executing program 3: 20:27:46 executing program 5: 20:27:46 executing program 2: 20:27:46 executing program 1: 20:27:46 executing program 4: 20:27:46 executing program 5: 20:27:46 executing program 3: 20:27:46 executing program 0: 20:27:46 executing program 2: 20:27:46 executing program 1: 20:27:46 executing program 4: 20:27:46 executing program 5: 20:27:46 executing program 3: 20:27:46 executing program 0: 20:27:46 executing program 2: 20:27:46 executing program 5: 20:27:46 executing program 1: 20:27:46 executing program 4: 20:27:46 executing program 3: 20:27:46 executing program 1: 20:27:46 executing program 0: 20:27:46 executing program 2: 20:27:46 executing program 5: 20:27:46 executing program 4: 20:27:46 executing program 3: 20:27:46 executing program 1: 20:27:46 executing program 0: 20:27:46 executing program 2: 20:27:46 executing program 5: 20:27:46 executing program 4: 20:27:46 executing program 3: 20:27:46 executing program 1: 20:27:47 executing program 2: 20:27:47 executing program 0: 20:27:47 executing program 4: 20:27:47 executing program 3: 20:27:47 executing program 5: 20:27:47 executing program 1: 20:27:47 executing program 2: 20:27:47 executing program 0: 20:27:47 executing program 4: 20:27:47 executing program 3: 20:27:47 executing program 5: 20:27:47 executing program 1: 20:27:47 executing program 2: 20:27:47 executing program 0: 20:27:47 executing program 4: 20:27:47 executing program 5: 20:27:47 executing program 3: 20:27:47 executing program 1: 20:27:47 executing program 4: 20:27:47 executing program 2: 20:27:47 executing program 0: 20:27:47 executing program 3: 20:27:47 executing program 5: 20:27:47 executing program 2: 20:27:47 executing program 4: 20:27:47 executing program 1: 20:27:47 executing program 0: 20:27:47 executing program 3: 20:27:47 executing program 4: 20:27:47 executing program 5: 20:27:47 executing program 2: 20:27:47 executing program 1: 20:27:47 executing program 0: 20:27:47 executing program 5: 20:27:47 executing program 4: 20:27:47 executing program 2: 20:27:47 executing program 1: 20:27:47 executing program 3: 20:27:47 executing program 0: 20:27:47 executing program 5: 20:27:47 executing program 4: 20:27:47 executing program 2: 20:27:47 executing program 0: 20:27:47 executing program 3: 20:27:47 executing program 5: 20:27:47 executing program 1: 20:27:47 executing program 4: 20:27:47 executing program 2: 20:27:47 executing program 3: 20:27:47 executing program 5: 20:27:47 executing program 1: 20:27:47 executing program 4: 20:27:47 executing program 0: 20:27:47 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 0: 20:27:48 executing program 1: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 1: 20:27:48 executing program 0: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 1: 20:27:48 executing program 0: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 1: 20:27:48 executing program 0: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 1: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 0: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 4: 20:27:48 executing program 1: 20:27:48 executing program 5: 20:27:48 executing program 2: 20:27:48 executing program 0: 20:27:48 executing program 3: 20:27:48 executing program 4: 20:27:48 executing program 1: 20:27:48 executing program 0: 20:27:48 executing program 5: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 4: 20:27:48 executing program 0: 20:27:48 executing program 1: 20:27:48 executing program 2: 20:27:48 executing program 3: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 0: 20:27:48 executing program 2: 20:27:48 executing program 1: 20:27:48 executing program 3: 20:27:48 executing program 5: 20:27:48 executing program 4: 20:27:48 executing program 0: 20:27:49 executing program 1: 20:27:49 executing program 2: 20:27:49 executing program 3: 20:27:49 executing program 5: 20:27:49 executing program 0: 20:27:49 executing program 4: 20:27:49 executing program 1: 20:27:49 executing program 2: 20:27:49 executing program 5: 20:27:49 executing program 3: 20:27:49 executing program 0: 20:27:49 executing program 4: 20:27:49 executing program 2: 20:27:49 executing program 0: 20:27:49 executing program 1: 20:27:49 executing program 5: 20:27:49 executing program 3: 20:27:49 executing program 4: 20:27:49 executing program 2: 20:27:49 executing program 1: 20:27:49 executing program 0: 20:27:49 executing program 5: 20:27:49 executing program 3: 20:27:49 executing program 4: 20:27:49 executing program 2: 20:27:49 executing program 1: 20:27:49 executing program 0: 20:27:49 executing program 5: 20:27:49 executing program 3: 20:27:49 executing program 4: 20:27:49 executing program 1: 20:27:49 executing program 2: 20:27:49 executing program 0: 20:27:49 executing program 3: 20:27:49 executing program 4: 20:27:49 executing program 1: 20:27:49 executing program 5: 20:27:49 executing program 0: 20:27:49 executing program 2: 20:27:49 executing program 3: 20:27:49 executing program 4: 20:27:49 executing program 2: 20:27:49 executing program 4: 20:27:49 executing program 3: 20:27:49 executing program 1: 20:27:49 executing program 0: 20:27:49 executing program 5: 20:27:49 executing program 3: 20:27:49 executing program 2: 20:27:49 executing program 4: 20:27:49 executing program 1: 20:27:49 executing program 0: 20:27:50 executing program 5: 20:27:50 executing program 3: 20:27:50 executing program 2: 20:27:50 executing program 4: 20:27:50 executing program 1: 20:27:50 executing program 0: 20:27:50 executing program 5: 20:27:50 executing program 3: 20:27:50 executing program 2: 20:27:50 executing program 4: 20:27:50 executing program 1: 20:27:50 executing program 0: 20:27:50 executing program 3: 20:27:50 executing program 5: 20:27:50 executing program 4: 20:27:50 executing program 2: 20:27:50 executing program 1: 20:27:50 executing program 0: 20:27:50 executing program 4: 20:27:50 executing program 3: 20:27:50 executing program 5: 20:27:50 executing program 1: 20:27:50 executing program 2: 20:27:50 executing program 0: 20:27:50 executing program 3: 20:27:50 executing program 5: 20:27:50 executing program 4: 20:27:50 executing program 1: 20:27:50 executing program 3: 20:27:50 executing program 2: 20:27:50 executing program 0: 20:27:50 executing program 5: 20:27:50 executing program 4: 20:27:50 executing program 2: 20:27:50 executing program 1: 20:27:50 executing program 3: 20:27:50 executing program 0: 20:27:50 executing program 4: 20:27:50 executing program 5: 20:27:50 executing program 1: 20:27:50 executing program 2: 20:27:50 executing program 3: 20:27:50 executing program 0: 20:27:50 executing program 4: 20:27:50 executing program 5: 20:27:50 executing program 1: 20:27:50 executing program 3: 20:27:50 executing program 2: 20:27:50 executing program 5: 20:27:50 executing program 0: 20:27:50 executing program 4: 20:27:50 executing program 1: 20:27:50 executing program 3: 20:27:50 executing program 2: 20:27:50 executing program 5: 20:27:51 executing program 4: 20:27:51 executing program 1: 20:27:51 executing program 0: 20:27:51 executing program 3: 20:27:51 executing program 2: 20:27:51 executing program 4: 20:27:51 executing program 5: 20:27:51 executing program 1: 20:27:51 executing program 0: 20:27:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 20:27:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x9, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) 20:27:51 executing program 4: 20:27:51 executing program 5: 20:27:51 executing program 1: 20:27:51 executing program 3: 20:27:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r1, 0x1385e557235a37bf, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) [ 391.334680][T23440] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 20:27:51 executing program 4: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x30, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x0, 0x9, "", {{}, [{{0x9, 0x5, 0x82, 0x2, 0x3ae}}]}}}]}}]}}, 0x0) 20:27:51 executing program 5: syz_io_uring_setup(0x1e54, &(0x7f00000002c0)={0x0, 0x5e6b, 0x8}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 20:27:51 executing program 3: bpf$OBJ_GET_PROG(0x13, 0x0, 0x0) [ 391.397214][T23445] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 20:27:51 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x20002, 0x0) 20:27:51 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 20:27:51 executing program 0: setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000940)='/dev/net/tun\x00', 0x4000, 0x0) 20:27:51 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x2, 0x0) 20:27:51 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) 20:27:51 executing program 5: bpf$OBJ_GET_PROG(0x19, 0x0, 0x0) 20:27:51 executing program 2: rt_sigtimedwait(&(0x7f0000000080), 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x8) 20:27:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 20:27:51 executing program 3: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0) [ 391.758235][ T5] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 392.004873][ T5] usb 5-1: Using ep0 maxpacket: 32 [ 392.144938][ T5] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 392.154582][ T5] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 392.184967][ T5] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 942 [ 392.386551][ T5] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 392.397511][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 392.406703][ T5] usb 5-1: Product: syz [ 392.410952][ T5] usb 5-1: Manufacturer: syz [ 392.418101][ T5] usb 5-1: SerialNumber: syz [ 392.445868][T23451] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 392.697590][ T5] usb 5-1: USB disconnect, device number 8 [ 393.464904][ T7] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 393.756590][ T7] usb 5-1: Using ep0 maxpacket: 32 [ 393.885257][ T7] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 393.895747][ T7] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 393.907932][ T7] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 942 [ 394.105393][ T7] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 394.114507][ T7] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 394.124194][ T7] usb 5-1: Product: syz [ 394.129509][ T7] usb 5-1: Manufacturer: syz [ 394.134144][ T7] usb 5-1: SerialNumber: syz [ 394.158128][T23451] raw-gadget gadget: fail, usb_ep_enable returned -22 20:27:54 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ashmem\x00', 0x0, 0x0) 20:27:54 executing program 1: r0 = epoll_create(0x5) epoll_wait(r0, &(0x7f0000000340)=[{}], 0x1, 0x0) 20:27:54 executing program 5: rt_sigaction(0x31, &(0x7f0000000880)={&(0x7f00000007c0)="c463b16d06658f892092ce6566430f2f0d8ed0c0df3ef01899998999993e670f168f9ea70000c4424da63c93440fed2f66460ff9c8410f957afe470f6e9a0127514d", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000008c0)) 20:27:54 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0x8040, 0x0) 20:27:54 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xcb7ba272271e6e46, 0x0) 20:27:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[], 0x50}}, 0x0) [ 394.439390][ T7] usb 5-1: USB disconnect, device number 9 20:27:54 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000a00)) 20:27:54 executing program 4: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000700)='syz1\x00', 0x1ff) 20:27:54 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dri/renderD128\x00', 0x0, 0x0) 20:27:54 executing program 1: bpf$OBJ_GET_PROG(0xc, 0x0, 0x0) 20:27:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000740)='/dev/full\x00', 0x0, 0x0) [ 394.496445][ T34] audit: type=1800 audit(1605126474.403:12): pid=23523 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16369 res=0 errno=0 20:27:54 executing program 0: readlinkat(0xffffffffffffff9c, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)=""/81, 0x51) [ 394.566248][ T34] audit: type=1800 audit(1605126474.403:13): pid=23523 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16369 res=0 errno=0 20:27:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001840)={'syztnl2\x00', 0x0}) 20:27:54 executing program 3: bpf$OBJ_GET_PROG(0xb, 0x0, 0x0) 20:27:54 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 20:27:54 executing program 2: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x18, &(0x7f0000000200)={[{0x1, 0x4e00, "e2"}, {0xc, 0x4e00, "148ee552f65b58df1cae8ff9"}]}) 20:27:54 executing program 5: r0 = socket(0x29, 0x2, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={0x0}}, 0xc844) 20:27:54 executing program 0: r0 = socket(0x29, 0x2, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 20:27:54 executing program 1: getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) 20:27:54 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x39f402, 0x0) 20:27:54 executing program 5: r0 = epoll_create(0x5) epoll_wait(r0, &(0x7f0000000340)=[{}], 0x1, 0x1) 20:27:54 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000001640)) 20:27:54 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 20:27:54 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ashmem\x00', 0x4800, 0x0) 20:27:54 executing program 5: io_uring_setup(0x68ed, &(0x7f0000000140)) 20:27:54 executing program 4: r0 = socket(0x29, 0x2, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, 0x0, 0x0) 20:27:54 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0x31d403, 0x0) [ 395.014881][ T7] usb 3-1: new high-speed USB device number 16 using dummy_hcd [ 395.604896][ T7] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 395.613929][ T7] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 395.634921][ T7] usb 3-1: Product: syz [ 395.634930][ T7] usb 3-1: Manufacturer: syz [ 395.634939][ T7] usb 3-1: SerialNumber: syz [ 395.685457][ T7] usb 3-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 396.374887][ T7] usb 3-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 396.778480][T19635] usb 3-1: USB disconnect, device number 16 [ 397.424962][ T7] ath9k_htc 3-1:1.0: ath9k_htc: Target is unresponsive [ 397.432040][ T7] ath9k_htc: Failed to initialize the device [ 397.444893][T19635] usb 3-1: ath9k_htc: USB layer deinitialized [ 397.804874][T19635] usb 3-1: new high-speed USB device number 17 using dummy_hcd 20:27:57 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x8001, 0x0) 20:27:57 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 20:27:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x1385e557235a37bf}, 0x14}}, 0x0) 20:27:57 executing program 4: bpf$OBJ_GET_PROG(0x1d, 0x0, 0x0) 20:27:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540)='ethtool\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x34, r1, 0x1385e557235a37bf, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x34}}, 0x0) 20:27:57 executing program 3: bpf$OBJ_GET_PROG(0x22, 0x0, 0x0) 20:27:57 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x8080, 0x0) 20:27:57 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000ac0)='l2tp\x00') 20:27:57 executing program 5: bpf$OBJ_GET_PROG(0x18, 0x0, 0x0) [ 397.970072][T23620] IPVS: ftp: loaded support on port[0] = 21 20:27:57 executing program 0: bpf$OBJ_GET_PROG(0x3, 0x0, 0x0) 20:27:57 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) epoll_create(0x5) 20:27:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x2e, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) 20:27:58 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0xc0000, 0x0) [ 398.739737][T23620] IPVS: ftp: loaded support on port[0] = 21 20:27:58 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 20:27:58 executing program 2: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vim2m\x00', 0x2, 0x0) 20:27:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000640)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) 20:27:58 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) 20:27:58 executing program 5: bpf$OBJ_GET_PROG(0x11, 0x0, 0x0) 20:27:58 executing program 4: openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x5}, 0x18) 20:27:58 executing program 3: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 398.857023][T23707] IPVS: ftp: loaded support on port[0] = 21 20:27:58 executing program 2: lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) 20:27:58 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2}}]}}]}}, 0x0) 20:27:58 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x440}, 0x18) 20:27:58 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x404100, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0xfffffc1e, 0x20}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x450880, 0x0) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000940)='/dev/net/tun\x00', 0x4000, 0x0) 20:27:58 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x1800) [ 398.958895][T23720] IPVS: ftp: loaded support on port[0] = 21 [ 399.265092][T19635] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 399.516250][T19635] usb 6-1: Using ep0 maxpacket: 32 20:27:59 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 20:27:59 executing program 2: rt_sigtimedwait(&(0x7f0000001200), 0x0, &(0x7f0000001300), 0x8) 20:27:59 executing program 4: setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000680), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000940)='/dev/net/tun\x00', 0x4000, 0x0) 20:27:59 executing program 0: clock_gettime(0x1, &(0x7f0000000a00)) [ 399.635270][T19635] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 399.645919][T19635] usb 6-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 399.665041][T19635] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 20:27:59 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 20:27:59 executing program 4: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={[0xfff]}, 0x8) 20:27:59 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x10041}, 0x18) 20:27:59 executing program 2: bpf$OBJ_GET_PROG(0xd, 0x0, 0x0) [ 399.752141][T23790] IPVS: ftp: loaded support on port[0] = 21 [ 399.840154][T19635] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 399.867382][T19635] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 399.891031][T19635] usb 6-1: Product: syz [ 399.903909][T19635] usb 6-1: Manufacturer: syz [ 399.916396][T19635] usb 6-1: SerialNumber: syz [ 400.177238][T19635] usb 6-1: USB disconnect, device number 4 [ 400.954886][T19635] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 401.194937][T19635] usb 6-1: Using ep0 maxpacket: 32 [ 401.315252][T19635] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 401.326244][T19635] usb 6-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 401.337433][T19635] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 401.505216][T19635] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 401.514258][T19635] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 401.535501][T19635] usb 6-1: Product: syz [ 401.543472][T19635] usb 6-1: Manufacturer: syz [ 401.554714][T19635] usb 6-1: SerialNumber: syz 20:28:01 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) 20:28:01 executing program 0: rt_sigaction(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000008c0)) 20:28:01 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000380)) 20:28:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='g\x9f\x7f\x12K?\x03\xd9\x87\x8a\xf2\x1d\a\xbd\x06\xfe[\x87\x00\x1f\xcf\xa5_\xf3p\xb3\xfa\x8c\xa1@\x82;h\xd6\xf5\x9e\x1b\xbc\xd2\xf9\x83\x86\x167\x91\x11JK\x1a\xd0\x85f\xab\xd5\xcf\xe7\xb5\xdeo\xeb\xfe\xd4\x8eI\x9a\xdb\x8d\xd8\a\xe0\xee\xafQ\xdfC\xe9#-\x00\x1a\xff\xe5\xec>\xcb\x885\xe6\xab.E\xbc\x8bl\x82\x9f\xb6Z\xde\x133\xf11\xeb\xfa\x15\xc7\x7fo{?m]\x15\'\x87b\a\x00w=Vqv\xb6ZD\x19W/\x00\xe9\xa4R\xac|\xf9\x95\xe3\xb7\x85\xc4\xe7\x8b]yX\xc93EO\xb0\a\x1f\xdfv_\xd5\xe3\x05\x9c\xd0\x9f\x92Wl\xd66\xa3\xca\xe7\xaa\xc1\xf9t\xc7\x9a\x01\x06\xc9,$\xe3\x9c\xf1\xb2t\x87\xcd\xb8\x13,f#\xed\xab\xd8Yd\xd7e\xdf\xd0rd\'\x06\x8c\xe6\xb1\xe5\x9a\xd5\xc4\x84\xf6\x02\xe6\xb5av\xb2\xfd\xff\xff\xff\xff\xff\xff\xff\xff\xfb7\xe1T%r\x8b\xbd\x06O\xcf\xaai\xfbt\x7f\xb7\xc61\x01\x13\xd5V\xee\x83\x97\x15 \xd3\xdeV\xd1S\x01\xfb\xbd w\aIsu\xc8\xf6\xb2\xe9N\a1\xac\xa5\xa5H\xac\xcdvM\xe2Y\xbc\xfbz\xbb\x13\x12\xfb\xaf\x7f\xa8\xbf\xa2\xa2\x9e4\xc3\x00\x9b\x9d\xdb\x87\xad\xceW\x9c>O\xe7\xb3\xc1\xabv\xe99]\xa9\x04\xaa\xcf\xe3\xb8\x9f\xfb\xb0\x83\xb4\xfa\xb2\x1f\xe4?JDr\xcbN\xab1\xc8|\xf3r\xb4\xc2\x18yr\x12\x93y\xaej\xe3WC\x8c~\x97\xff\x90\xfa\xeb^l$X\xab\xb6\xd9\x9bN2`d\x00\x14+\xbc\x9d\xfb\xb5\x1f\x9d\xb09\x90:&F\xf0\xf2*\rc\x06u/\xb6|\xc2P\x00\xdcc\x0e\xf66\xd0\x95t]\xfb\'q\xcb\xe0m\xadn\xa5\x00\x1b\x9b9O\x7fw\xd95D\x13\x80zi\xab\xf2\x02\xb8\x80\xecV^\xc8\x84\x96\xbc\x19\x16\xdbd?R\xdbf\xbfwY?u\xc8\xa52\xdaO|\x11T\x9fg\xd8;\xceq@.\xc3\xb2fA,\xc5\xbc\xca\x03\x1fx\x19\xc7`[t\xae@\xbc\x8d\x0f\xdc\x1cB\xf5\xd1\x9b\xd7\x8fK;\xd5a\xa2\x97U\x91\x1dh\xbfh\xd1I\xa3\xc8\xf1j\x9a}|N\xeb=z\xc2\x9c\a|\x8b\x8a\xd9\x8c\x11@\xbfkO\x02\xb2\xa6\x98\xb4\xb5\xc1\x93\x8f\xaf\xd9\x15\xa0D\f\xda\xc4\xb6\xa5,\x9d\x19\xfa\a\xca\xb4\xed\n\xbc\bG\xf0\x04UQo:V\xcf\xe3\x88J\xd4\xf3\x84:\x86DX#\xea\xac\r\xf3\x81A$\xaa\x1d\x92B6\x15\xa7\xfb\x94\xaa\x1a\xc42\xdb|rI') 20:28:01 executing program 3: getgroups(0x1, &(0x7f0000000080)=[0xee00]) 20:28:01 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 401.814914][ T54] usb 6-1: USB disconnect, device number 5 20:28:01 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc0c0, 0x0) 20:28:01 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0x321600, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 20:28:01 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x101200, 0x0) r0 = epoll_create(0x5) epoll_wait(r0, &(0x7f0000000340)=[{}], 0x1, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, 0x0) 20:28:01 executing program 3: [ 401.899822][T23864] IPVS: ftp: loaded support on port[0] = 21 20:28:01 executing program 5: 20:28:01 executing program 3: 20:28:01 executing program 4: 20:28:02 executing program 0: 20:28:02 executing program 5: 20:28:02 executing program 2: 20:28:02 executing program 3: 20:28:02 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:02 executing program 4: 20:28:02 executing program 5: 20:28:02 executing program 0: 20:28:02 executing program 2: 20:28:02 executing program 3: 20:28:02 executing program 0: 20:28:02 executing program 5: 20:28:02 executing program 4: 20:28:02 executing program 3: 20:28:02 executing program 2: [ 402.814399][T23919] IPVS: ftp: loaded support on port[0] = 21 20:28:02 executing program 5: 20:28:03 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:03 executing program 0: 20:28:03 executing program 4: 20:28:03 executing program 2: 20:28:03 executing program 5: 20:28:03 executing program 3: 20:28:03 executing program 4: 20:28:03 executing program 2: 20:28:03 executing program 3: 20:28:03 executing program 5: 20:28:03 executing program 0: [ 403.684571][T23967] IPVS: ftp: loaded support on port[0] = 21 20:28:03 executing program 2: 20:28:04 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:04 executing program 4: 20:28:04 executing program 3: 20:28:04 executing program 5: 20:28:04 executing program 0: 20:28:04 executing program 2: 20:28:04 executing program 3: 20:28:04 executing program 4: 20:28:04 executing program 5: 20:28:04 executing program 2: 20:28:04 executing program 0: 20:28:04 executing program 4: [ 404.614678][T24017] IPVS: ftp: loaded support on port[0] = 21 20:28:05 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:05 executing program 3: 20:28:05 executing program 5: 20:28:05 executing program 2: 20:28:05 executing program 0: 20:28:05 executing program 4: 20:28:05 executing program 5: 20:28:05 executing program 4: 20:28:05 executing program 0: 20:28:05 executing program 3: 20:28:05 executing program 2: [ 405.475873][T24063] IPVS: ftp: loaded support on port[0] = 21 20:28:05 executing program 4: 20:28:06 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:06 executing program 5: 20:28:06 executing program 3: 20:28:06 executing program 0: 20:28:06 executing program 2: 20:28:06 executing program 4: 20:28:06 executing program 4: 20:28:06 executing program 3: 20:28:06 executing program 2: 20:28:06 executing program 5: 20:28:06 executing program 0: [ 406.354064][T24111] IPVS: ftp: loaded support on port[0] = 21 20:28:06 executing program 4: 20:28:07 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:07 executing program 0: 20:28:07 executing program 5: 20:28:07 executing program 3: 20:28:07 executing program 2: 20:28:07 executing program 4: 20:28:07 executing program 3: 20:28:07 executing program 2: 20:28:07 executing program 4: 20:28:07 executing program 0: 20:28:07 executing program 5: sched_setscheduler(0x0, 0x0, &(0x7f0000005200)) [ 407.212738][T24159] IPVS: ftp: loaded support on port[0] = 21 20:28:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/dlm-control\x00', 0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ocfs2_control\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 20:28:07 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:07 executing program 2: r0 = socket(0x25, 0x5, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=ANY=[], 0x68}}, 0x0) 20:28:07 executing program 0: r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000140)) 20:28:07 executing program 4: pipe2(&(0x7f0000000100), 0x0) pselect6(0x40, &(0x7f00000001c0)={0x2}, &(0x7f0000000200)={0x6}, &(0x7f0000000240)={0x9}, &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x1]}, 0x8}) 20:28:07 executing program 5: request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) 20:28:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20001780) 20:28:08 executing program 5: connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) 20:28:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x4020940d, 0x0) 20:28:08 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 20:28:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev}}) 20:28:08 executing program 2: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) pipe2(&(0x7f0000000b40), 0x0) [ 408.099682][T24215] IPVS: ftp: loaded support on port[0] = 21 20:28:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001780)) 20:28:08 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:08 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/time\x00') 20:28:08 executing program 2: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) 20:28:08 executing program 4: clock_adjtime(0x7, 0x0) 20:28:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000023c0)={&(0x7f0000002240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002380)={&(0x7f0000002280)={0x14}, 0x14}}, 0x0) 20:28:08 executing program 3: socketpair(0x28, 0x0, 0x1cf39993, &(0x7f0000000080)) 20:28:08 executing program 3: ioctl$SNAPSHOT_PREF_IMAGE_SIZE(0xffffffffffffffff, 0x3312, 0x0) 20:28:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 20:28:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000002040)='/dev/snapshot\x00', 0x0, 0x0) 20:28:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:28:08 executing program 5: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f00000001c0)=[{0x0}], 0x0, 0x0) [ 408.999735][T24276] IPVS: ftp: loaded support on port[0] = 21 20:28:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x89a0, &(0x7f0000000140)={@local}) 20:28:09 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:09 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, 0x0, 0x0) 20:28:09 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x15, 0x80005, 0x0) timerfd_create(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 20:28:09 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, 0x0, &(0x7f0000000000)=0x20) 20:28:09 executing program 3: request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffffffffffffffc) 20:28:09 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/216, 0xd8) pipe(&(0x7f0000000480)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0060b187aa967fd4e355543e83e94927d6a87d65617c0ffe4096"]) 20:28:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r0, r3) 20:28:09 executing program 0: sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8084}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x20000040) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x1410, 0x10, 0x0, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000004}, 0x400c080) syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(0xffffffffffffffff, 0x3312, 0x7fffffff) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) lstat(&(0x7f0000000680)='\x00', 0x0) setreuid(0x0, 0xffffffffffffffff) 20:28:09 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, &(0x7f0000005500)=@l2, &(0x7f0000005580)=0x80) [ 409.880505][T24340] IPVS: ftp: loaded support on port[0] = 21 [ 409.911295][T24337] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 20:28:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000076c0)={'team0\x00'}) [ 409.946333][T24337] ext4 filesystem being mounted at /root/syzkaller-testdir399802418/syzkaller.XLcCf6/925/file0 supports timestamps until 2038 (0x7fffffff) 20:28:09 executing program 3: set_mempolicy(0x0, &(0x7f0000000200), 0x800) 20:28:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, 0x0, 0x0, 0x0) 20:28:10 executing program 3: set_mempolicy(0x0, &(0x7f0000000200), 0x800) 20:28:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000022c0)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) 20:28:10 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000001680)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 20:28:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000003780)={&(0x7f0000003640)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000003740)={&(0x7f00000036c0)={0x14}, 0x14}}, 0x0) 20:28:10 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:10 executing program 2: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{0x0}], 0x0, 0x0) 20:28:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000100)=""/21, 0x15) 20:28:10 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) 20:28:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c0010000d542bd"], 0x1c0}}, 0x0) 20:28:10 executing program 5: set_mempolicy(0x2, &(0x7f0000000200)=0x9, 0x800) [ 410.748207][T24408] IPVS: ftp: loaded support on port[0] = 21 20:28:10 executing program 2: sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, 0x0, 0x800) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@commit={'commit', 0x3d, 0x40}}, {@replayonly='replayonly'}, {@replayonly='replayonly'}]}) pipe2(0x0, 0x0) 20:28:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) 20:28:10 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1a3881, 0x0) 20:28:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="6426f30fc7fb2e660f6f96416bd9e0f4f23ef0f65316f2adbaf80c66b8bc3e6c8166efbafc0cb0faee74e0bad004b000ee0fc7a20000", 0x36}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, 0x0) r3 = syz_open_procfs(0x0, 0x0) recvmmsg(r3, &(0x7f0000002800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=""/92, 0x5c}, 0x8001}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:28:10 executing program 4: pipe2(&(0x7f0000000b80)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 20:28:10 executing program 5: socket$phonet_pipe(0x23, 0x5, 0x2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 410.961202][T24436] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" 20:28:11 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:11 executing program 0: socketpair(0x21, 0x0, 0x0, &(0x7f0000000080)) 20:28:11 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000700)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000780)={0x0, 0x0, "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"}, 0x1001, 0xfffffffffffffffa) 20:28:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, @ipx={0x4, 0x0, 0x0, "f646b210b73b"}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="9ef984d59758"}}) 20:28:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8936, &(0x7f0000000140)={@local}) 20:28:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="6426f30fc7fb2e660f6f96416bd9e0f4f23ef0f65316f2adbaf80c66b8bc3e6c8166efbafc0cb0faee74e0bad004b000ee0fc7a20000", 0x36}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, 0x0) r3 = syz_open_procfs(0x0, 0x0) recvmmsg(r3, &(0x7f0000002800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=""/92, 0x5c}, 0x8001}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:28:11 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/asound/card2/oss_mixer\x00', 0x40, 0x0) 20:28:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000040c0)={'syztnl0\x00', 0x0}) 20:28:11 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001640)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) [ 411.651839][T24489] IPVS: ftp: loaded support on port[0] = 21 20:28:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000002400)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000024c0)='batadv\x00') 20:28:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0) 20:28:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000029c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0x79, 0x3, "a8d644054c2d88aa7f9b9dbb6ec49565c7e6c5c5bbf75ed3cde4029e57116c56de3a78b71d9772caea98682f2d21019574cc6624ca126f1ec21bccc8dfdce505b30a120049956f745a4545f3599d4c199277adad25e72a7048b2fa9c0adc231dcbfbb9dc96910f9ef9d5b7da99aa484d0570c34ed9"}, @ETHTOOL_A_WOL_SOPASS={0xc9, 0x3, "2c98497b6ee741acf3042da7d85ff687ac19c389ed7c724ed8698f3e6b8b3f2767c4c328ac4f1cdf4551429f4c276fa10a6228297c635911becc52c6f7b854c4976d9b141b43e75cb9577b3f353ec95518511c239b2b331956358227321292376010d091302276aa3f7257416a72e4fdcc2a7151389704389bca451df986153d399f3ce85a436d32be5458e1cb7fc8f31b489f729483fd86218145fa87e0d8b8860ef7113fdde9b4fb141ad39a98b129b26d1c67cc0d0299978306c215c70fbc2d7bb3cb78"}, @ETHTOOL_A_WOL_MODES={0xd68, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x15c, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'Q@\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '&)!\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'team0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'team0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '&)!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x7d, 0x4, "3d775e074c6ad11bcf5201e4cae2d9424a205202dd6b479ed385f69ca61840fae7ea300e9977e5dfedfe3603f64098218eb713d08d8e3fe711cc2467622d8762dafbf3eadce75193fde3b32d95e15118623999bc81d9d95bea38689a903cd598fc38e23669338950760a9f311de93d60ee28962537fc93741b"}, @ETHTOOL_A_BITSET_MASK={0x145, 0x5, "01aed79f2cc1a2f075544ccf8b4f744ab497800ea3ad4dd597f3eff37aa37fdf5b5e20245583c2df6c849b7c080efd170a48ea79e5839c4cad3a0c54734255633e146325ae87701382924c9edb7d21a081ed9f13d77f1fcdfef83e0cb56086e4ac8acfa2f17ebb6358b9b9ddf6c65378f9347f4cd431f36f7cdc14552908cc977e8c8b817a8d74ba15da002fe9e6853a7d16ab8593ec8249484388bed54575f78b9c9b9dd35e31adde99ee88cc821761b393b4e06b048365605272311dc46aae996f45abf63fa325fdd983e7a64cdd94deb10156a441bbbfa897276ce1a6b3c63841ebdd945a726b9131c6684f9d39a86fec4dc43ac6a1ca76117b3e1be832495d7967fa786f59b0f2dcb16ac80cd62906306b2b10720f4720b994e5307996dd73f95d027c086493f931187e435da42658957cac91894b7bac3984e8ca68e47065"}, @ETHTOOL_A_BITSET_VALUE={0xa35, 0x4, "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"}]}]}, 0xec4}}, 0x0) 20:28:12 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:12 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x84000, 0x0) 20:28:12 executing program 4: rt_sigsuspend(&(0x7f0000000000)={[0x40]}, 0x8) 20:28:12 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2010, &(0x7f00000004c0)) 20:28:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x24}}, 0x0) 20:28:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="6426f30fc7fb2e660f6f96416bd9e0f4f23ef0f65316f2adbaf80c66b8bc3e6c8166efbafc0cb0faee74e0bad004b000ee0fc7a20000", 0x36}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, 0x0) r3 = syz_open_procfs(0x0, 0x0) recvmmsg(r3, &(0x7f0000002800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=""/92, 0x5c}, 0x8001}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:28:12 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f00000009c0)='mptcp_pm\x00') 20:28:12 executing program 5: request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) [ 412.531284][T24553] IPVS: ftp: loaded support on port[0] = 21 20:28:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002380)={0x0}}, 0x0) 20:28:12 executing program 5: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="c0", 0x1, 0x2}], 0x0, 0x0) 20:28:12 executing program 0: add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', 0x0, 0x0, 0x5a, 0xfffffffffffffffc) 20:28:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000040)="fb4db9c6263b4f00cdbd5db46aa3dd60bd8e2ecee4ec154694bbd6ac4de82326043e3bce80b396a310fdbb35b7c0358c4019bb590b2705b98d61904f3bb8e88f82d494ac09b0cb44042fb1d09d2c9be8818f7f0d6f513be4924c2259340c70e1ab4f876c5afdb29f62a5802acbc57b43bb34c7e643ee299e3ca2679338dc3c5eaa664f2efb0c47115fcb54ea8691949eb805ced3e36a49dfd1b9761663f7afd89aa9558df1d52d29ab224f888cc86f4dbb14369eadbc00e73ff28821a1efce875a6b417744229075c1", 0xc9}, {&(0x7f0000000180)="ec37fb94d62f1afa339af589023b1a67455c5fcd95381fd844e6ea54156183bb56d30af2b5eba97abb8410a4e86f6ebcfa2f740722fd", 0x36}, {&(0x7f00000015c0)="ed7439fbb18e8d65908c873477eb3f48c7290cb81417f33b784c0ea65b9d6d420b913c5b3b73558dc4ad98ea1f828ab96cb1ed097fc5ae3deb5c30443f4dec9dc3972888996a39622e97014e31e26e44b30cfd73e8129e518613b2e4b554467f478b3a70c7572330cdf3475ba3e45a1f67b1ea620c9da1568884a7953910cf3bd2104778d128725d3cf9acc8fe643f3db56031122bba57492f2c2ed453518a82ddc2dcb9c53a17ff8be5fac3cb792f68ef9e0e2a75bfd39d46d2908a6ad74b1b3f61416a88beb1aa393d18dbb65c318c5e4e61f568404e4142c862bca3b96da08a235cd4049407253a9083038a07a7bb271dccda2a61af287ca05b9c015f2e253db813a88a68eb1afde54b8e4061eb941622d4d3183a1ccbde05adcba317957bd747591c1fcad9058f38f18ed276db644b92f35219e0af7c3d6a1923d0d0e23fa4ba193fc43bf6e258ea75754173877ce148e31189790195c4f8934f07f808aa94b3dabbd19c7c422fe7d14012843833948e1ff54774a50b54f3f8859672650db50bc1e81e4155628b15c4c051921bf6408b9da90920632a45cb7b815daa6df008f96460c4fc5784e417adbe5360c0dbbec15529dc1e6e236f6d914a4b38d32d1b8f01b3aaa08b98198a8dc451501a3944de9ee3d21cf78ee698e87e2be4583ed36fad2c4a52c7dfd5e080678a779dd7e96af4154a1bf8fed5132b2d5817f87ce850c9ef2ab3ee7897c95b70d29f0dea2624f70631ab09dae98540b6cfb8a50e248ce305014f2754c772dcdce59d4a307061499536860f35645dcd29adabbac24e9fa854d5d4378286301f04cd4b8c675049a389ad803526565f0d7284348f75f11a44949f16df92214c2c0a3a4641cfd4a16ceed3c4d8f48f3e8d2dde7fc643c5d1ea5b69cd7e40bebc59040d3e30df8e68133714428392c24619ac63ccef21fd056d4d72634ede9796fb63129ae00866f8311d81004f3c17b6c8342ea6583bdf05f10d514cf6131dc120c7d5218bec498c566f0b447933879361e6e26b210d9e0482d9e7a29bf60c04b5d3b814fa7a99c624ba50621a84e3cfd6f7a78880e81bf67b3faefd51354a2753c6471eba4c4c678e80c5e25543180160f6120144045c85814c454f91691c292e7f96523dd554cd354e2a3dac49c6e86158315566e2e01b79d3b685fdb323e2cc2064fb71c91f63f12df1999b320ba2ed4dd36fc8a597c5ed5dcfbbe2be98ce17cf22cfc218162dbd8bb8acca682d80cd60a3b9e411d6b823033b18194093d310aee8eb60d08cd8e2da7ca4afd72a33319b7895bb112871799db115d8488a559621a56c7683d5d7c13ee9efa67dc568d70de74bce759686ed7892260ca3300f3c5fa693b30d47a0ee0f4ea6af8229e2817159f117cc78e7355f8f6f6fbefe0214be90505c2a07036546d63e27800dbac3083479f0b83beff000d9be858af1741a222f7ab69b771caa26df39956bc0d8eca5176258ff2bea4a609cbc703cdb007f8cda6a3f18730ab2cc9e0c2f664a9c90b9e73329274049e3806a223c815cf116ba702ad24e33a90aa386a4fd947d7f529fc071e697ee176a23d9fb7384b74b59bd05797dec317bcbeeacf70fa93074abfc6c6c00327a60c3f411c8e12ec6fbaa7a0b5e7b33b07f0df9d8729b9f70f3d8defa7552b0192f62905ab2ca063638a6b6cf070aac2b6c0518b390a8f994b760d068e63b4a2541c69403c2e335bc5395b58dad8f934680e15715948fc68f0d274580d26572b05ce29cddcce66d3e83e78faf8ad0a5348c1f49a21201320518af788a7f7159307450d8aa251dbf17081dd5a3148157b06d0d710028fb9c41baa948c887b695a16929fb73d64db22ce09fc2c6a34ea28c815956a516f0f7d03de662f8fc78de1df649cef1adc3ed640333e285a61f5133e8bd42f012ed45afe9b9a0d7da47bcd1459abd7abe32ff7c972f052f3e8c8518426cbf4a7dd972b3c7103e3d602bd35ff3414eaa41cd84be3c5400afafed32be11a7172753dbd071405b4f2a52c37ed626be823c133cd96b3f72140b5d5329f5e5d6a82485792597ada27219c9d5d4964e40c8ab8682a02aff5278e2cc7e40cd2b10b689b4396f72bf654b6a841d6f2ed46399a0bc1030e0a2f14b93365f408ca311a1701e5f246a9bf817ae29d05f7a5a8c879b3a54e401160521718a18de9ee69f970dcb2bab7e1950dc7c95fd358f7878a223587695ad51f9b3de6fc789c1e1e9c615d4effae4fb76b254277fe1823dbad895ba10f62e08a5c2bea9e8b3de64dcf2670f98946b561738f88b890af0d6c9f236439a1fa9775dfc157ae91d4add34ec766b1a8c05a51dd7ff62f1e4247f661d6ea4abc86418eb7578d1819de3301a0f6e3f6e992ee1c305a2c0740559ced8687c6aa33ed5dcd3aebf022d897f2e364f9d799d2202e28bf3a284de1e3d0775cce3407fb474a7f3eea05d79b33bd6de4622fcf10b6004bf97eaa66fe458635d900bce4556727eb6858291bc20ad2391110b93da494826ed662f17c7651dc7dd610874ef43e76ca23a1f4b2788f785b7fdaa855f35bea4a4b3b004d099bff5fc3427d35b39d3c3992241ef465a182b5644889096f97c3d01838484a453a90b84fcc847d907a95c86f624ad57f4325ae7dff555d1191404abba44155a56c04f6504ed0451523eb41f9fee8d2cf234ec4a9f3fe96f7abf6b3d004ab8066b77a0834adc6e3b5873679d194fdd80e7c8bdee9f20aa10ab39ade6dc223cbfe6a016139fb68e91a281eb24b3178f0524ee136eb042c42774846f994e6df202aa21af34658e29ffb5646ea1d6717cf692e64e46b32d0f13dfa8b6f69d30f45d286328099c58c914195f3bd431d846f59a371be233b6ca51826aaf5721c4f4a6c87e014d87f6e13cffcfc24b8514d189e02ef29b74b0493d9ac96a0ccd3972c30a5576c68428bb3ce8eaf7131672154f3b1edd652b098a6cfbf5e3f37ac5333ad991776ce2e89a320617db626b1e7d9b527d796bfe5654cf7541fe4087f96bdf48a86c213783d77dbf2f19251c445cf4f93c5fe773cf19b0cf6b8e919b34ecc3bc6bac8e6df7b67e1dccb81e1c701242c84d6067981fcc682053ea1af241cfbf02258395845930a03eb3de70a5860bef9d4b7c087baf4e22fdf899241d3fa19af6fab805a5f3dce3d0ebe16bafc957104c87559baad1a9b6045b8145a13962611a124c6bb458d8d777f8932b6f6fb29240597d3877dcc76342fb224176f24c4c4f6810835e9e5908265e3d5d1724f27e26f7b550eb0193033ee15bb5ee09f2f0c7e7a4bf7eb430fdb242bd59ad2bb326ffe133bce88119c79cedaa8efebde1faa89f7c6d71f94ee1de7aac69760c8254e8fd22887775c3e47a2c05419182e5e2b9195bdb73734597b7e1e43960d221f4d6ce606accbde20d3b64d4ccd52115f6b4ef38940e462a52839205b1d38b7b46dbe8c1f117fe8eaffa5acd3ba3a11465ebd4d15c2fe0f9d3127ddae03f9f98c4f25d0c638ad92b49b4435f98b4bbe161afedb181f67f00a061b1183913ab6c94cee24457458f6357963b29e2b668d0c387ed0ba078180c012a6cf89b947fb94a29d800ec8b5e68841125df704eab2f9832576c1cee056e69e42e20d65906f8703b62d7c0c623c5ce8d95f88ccb0a269c9fd52b1ade14004967ac8332266bff85d6152e58ec8dc70fa669385a8aa189db8927ead015b1953327d8c1db6745b27b31c481b0233b4bd04b8dd2cd2d6bb34ad2e94ba97f58b1c2b33c788b56630cc511acb5cf8bbcb1e06121eeb273d3962b494c94e59288f9cbf73278eb3eeb7050149154639d99b3264867867f7706c554d70180000000000000d5bd395a203d66e3643fd0b383af6e1510be61d9aa7ee16d5f7f43e66256eb79ce687cdd11afda9e0fd424500f2fcf0bef42b46eff6f28ff7a70b24ffb0d80235b5a4652c8aa9811e754a4bf44812d541487eadc643ebc6fad6e8446bbffa737ef9684f6599acde4af5fe7cc3c286b627e523d16faa0ee6bf3677cb4a30796ba6e01a856231a7224f570d6eb87cb05a4e9f2246b89cc1a972280e2b0c5653f083a95a8ca3c34c935066061acdc15d72e4a1a38ceb49101e44148e04e7d44712f89ebe9f220e9d941873936ab125cf0a30ff266944953d4adb56b3383bbba63221e7a9bdd26f9950c7c097c66ac5096b8a1c177a820e619ef90fec65dec7a92a0f4d0fc8bf95aae52fadbcb1a9c95abc1cd174fbc4003f6803e40b344f91a6750fa4a1e34fa9e55afcdc94c00c86f924f4d9a3d9df20763c9d6a3e26a7b61b36210a1153fe9464b10c16b88b0ddab08dbf197fde7662e956ce2448384b91893aa2ef5c68a752831197c10f95e7105b3ea97884b40d7bb4aba95305667ccdd891c7ab765e9828f6fd1b04aad0b18faaad1e451b81026e6a1602f95e9eff888f6729d8487a325d4f6f2980e0c4018497665e7abe353f9d56721a1234e671a46f9054e208653701345733ec625cc64bb020e03144cd1072715b7f418bc89ae6da2174bab5cc49c264119d194ce29e9db0d57c14bcb61cd5b79043c660282bdf74c1e2efcdf776e7a7d29bc5a9c17dd71402202a9bdc52072c2fd683e432c979da45a24cc5f49e839586db2c90615a2350dcc6ff5da7c883eacbdf2ca26e7a143b25bd4fa9367c5c839d9290e421cf51e3a417b1ea1a91ae890181c053e1d9d65664539e17272de982af21e24cd11faacb3f80734282ea46890ce710956959099bff65cb55c7e825213655cefb25a5a8eb98165979ce9785f2e256458ab8fe9426299a819981e062b2ba381babef789b4d3552d7025dd0af98861ebe2e144a3611c54c73fc08166fb6ca13deec7b9168189ef8b8f86a877588c366edfb590bfcb38b7b10aaa074009cf6cda0f8be07e1f448e9e17b101ad8f4aaca29eae654c6abebe1c278bd39c62034341713037891d59f9fb43d40ec188b24bdd4e5c805925518fa0461aec4e0c5cb41d511785b4d0d44f6d80bc0258dba8edb6059db4cb0d6991872a59fc9a03d98ae3eb603364aac0190824904c08873fe1f90f2732acf4e4982df5b0419deae51c1176b39018793080e2cf8c3340f6e7e632221a4d4f3a5ff7f1229b7828ef87c4c90f5e056359e5c0bfcb47accc1c90b05864537b31fd7124fcc64afff91a756d0eaaa3bc5055ca12765321740f9d29120aaf4f2bdace38580f4604d00c00bf13d61413fbc0b45a7bc6cdf3aa18ef46ac79f938814e47d7f1bc6818a2222fbd76b9fd4e86400a7943cfacb47ceb918edf92c1b1eb1014083386270d249e3216eed27794a1fe5a76fed7669ef0bb4745573d17d852d9ac6bc014413dda5de1fcf112021ac03b5c3355a4ed18221464c350cddadac6f256e81ffbca4459299af47181852f868fd9652bdc538c2657130816f1e56e1e2ab1c9ee15e89cffc686b0fc3c962704a3ed16e641eabbd1b35fe84d5b55a34a2ebcd3544d4118756d98649aaf3837bd825d06cfedcc9e24b6d5ac798feff7004916b5baba53330d7405f6b9be9a8048996b3fed429d7065e78a3291734cc84121b69a03f3e8c6ff0c3a8f4837d7c149d78ec63f8c3774a9389cce301d2caaa3957faab630224b76fd2b55a39c2b53921008c93c8859519102515421ce648c38c8a2a3215d68cabba81735429950b93a9fe36a36a4ac04181d279301d0b3bc38031aaf3e3e97e705eb27e9834505d0efd3639cf74f9aeab532e9186ad1c792da05cff644095851f89a314e4759419e9359f123f63d57ef3bac223fe6c7f142a97198a0abce3e3fc1399cd31e04928b58b4d60d4be153dc8e378b4bc4ca73b1693308aef67ca4792e7492cb49d0b73a292f9cd8d2de94d2fabc9d711365980b92a12da8a1a3813fba7473028d0fa8d07c8e025e469625752e1de7a4d9935c1801bb4d38743b53624281890d7c2312598e757093cba46a281f4374de35aa84b33bc5b68b", 0x1087}, {&(0x7f0000000300)="e55f4ff4592ce3d09e6058bb59e537e48736adcb", 0x14}, {&(0x7f0000001200)="47970f30eb7bf04e978152682628885b574987221df73b83aac531eaf65d8878d28d4a99168129f47db72d5cd609dd1014069f73da571b020b41d5094471500d851ba04cec02caebee8efa47c8382790609065f0225bab092fbdde4a9f3c94b3e6f0c9e5cd2d3c7e036ce3f3df0d50cda6440826", 0x74}, {&(0x7f00000001c0)="51377cd3801c06f6f420c26a522411833786b86128af9d98bf6098407b320dfc7a406a8278ce17928ddbad07f0a78490822cc503d3584bab78bf63cc7220dd8d92b41a751c9cdea156d27edcda58d1293ff2e97c9408d83b797ca97c1018dd3a6915e3af7cec5e96750b3241fff432d4627c7e871f36aa54595f683d0ce4ef5fd1681f4ed3e405b7e39114cbe0ebedc3625f1143cb6ded6a6bae43d16a25fe62190ea4d1e9d6674c6ee8f158e16fceb295605f74f6a4a743bf076ec4533f846ae4", 0xbb}, {&(0x7f0000001340)="52dd5d4922a4467eeb6ea060e1e17a39cdad0322070b1a636d0c447e07a0cfd37cdb2f17cbe1866e204c2fa65275d40e4d0c7545a57b4a66c244b02386f0e9701b536445569ec4936d391b0199ab710c9d8fa684beecf58900", 0x59}], 0x100000000000005c, &(0x7f0000001440)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 20:28:13 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:13 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2d2983, 0x0) 20:28:13 executing program 4: r0 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r0, &(0x7f0000002d40)) 20:28:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 20:28:13 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)="b6", 0x1, r0) 20:28:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="6426f30fc7fb2e660f6f96416bd9e0f4f23ef0f65316f2adbaf80c66b8bc3e6c8166efbafc0cb0faee74e0bad004b000ee0fc7a20000", 0x36}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, 0x0) r3 = syz_open_procfs(0x0, 0x0) recvmmsg(r3, &(0x7f0000002800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=""/92, 0x5c}, 0x8001}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:28:13 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x0, 0xa, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "dfcc49ae"}, 0x0, 0x0, @fd, 0x1}) [ 413.413311][T24614] IPVS: ftp: loaded support on port[0] = 21 20:28:13 executing program 5: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x24) 20:28:13 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, 0x0, &(0x7f0000005580)) 20:28:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x2, 0x0) 20:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100767469000c00028008000500ffffffff08000a00", @ANYRES32], 0x40}}, 0x0) 20:28:13 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) 20:28:14 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:14 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000002040)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000003680)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000003740)={&(0x7f00000036c0)={0x14}, 0x14}}, 0x0) 20:28:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x30, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x161c}]]}, 0x30}}, 0x0) 20:28:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_ROLE={0x8}]}}}}]}, 0x48}}, 0x0) 20:28:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x40049409, 0x0) 20:28:14 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:28:14 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 20:28:14 executing program 5: set_mempolicy(0x2, &(0x7f0000000200)=0x9, 0x800) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') 20:28:14 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="c09de18f602b4f729dd16ed41c9f8e26349d9158b6c49c0bf220ce82c57c6a66fe4a6d357ba1c2aa2b864d5c5f59f8b57b75c5962d0e52f536217560d0f22bfe439fe31449209fa6f2656b72b8507d0b9c70ba4f5b", 0x55, 0x2}], 0x20, &(0x7f0000000200)={[{@commit={'commit', 0x3d, 0x40}}, {@acl='acl'}, {@replayonly='replayonly'}, {@replayonly='replayonly'}]}) pipe2(0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) 20:28:14 executing program 4: r0 = gettid() sched_setaffinity(r0, 0x8, &(0x7f0000000400)) 20:28:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001380)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@flowinfo={{0x14, 0x29, 0xb, 0x80000001}}, @dontfrag={{0x14}}], 0x30}}], 0x1, 0x0) [ 414.286470][T24693] IPVS: ftp: loaded support on port[0] = 21 20:28:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f00000016c0)=[{{&(0x7f0000000400)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}], 0x30}}], 0x1, 0x0) 20:28:15 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000740)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}], 0x1, 0x40081) 20:28:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000004300)={'syztnl2\x00', 0x0}) 20:28:15 executing program 4: modify_ldt$write(0x1, &(0x7f0000002d00), 0x10) 20:28:15 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001600)={'ip6tnl0\x00', 0x0}) 20:28:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0xc020660b, 0x0) 20:28:15 executing program 5: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) 20:28:15 executing program 4: 20:28:15 executing program 3: [ 415.145293][T24753] IPVS: ftp: loaded support on port[0] = 21 20:28:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x6, 0x1}, 0x40) 20:28:15 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f00000004c0)) 20:28:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000023c0)={0x0, 0x0, 0x0}, 0x0) 20:28:15 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:15 executing program 5: delete_module(&(0x7f0000000000)=')\x00', 0x0) 20:28:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 20:28:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000002200)={'ip6_vti0\x00', 0x0}) 20:28:15 executing program 4: bpf$MAP_CREATE(0x13, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 20:28:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000005580)) 20:28:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c0"], 0x1c0}}, 0x0) 20:28:15 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r2, &(0x7f00000001c0)="b3e38856c509b0cf36b407cb48cf", 0xe, 0x0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) 20:28:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001740)={0x9, 0x0, 0x0, 0x0, 0x6, 0x1}, 0x40) 20:28:15 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000640)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) [ 416.003727][T24805] IPVS: ftp: loaded support on port[0] = 21 20:28:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='0', 0x1}, {&(0x7f0000000140), 0x2c}], 0x8) 20:28:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x8, 0xc5e, 0x3, 0x4, 0xffffffff, 0x0, 0x800000, 0x0, 0x0, 0x40], 0x102004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:28:16 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:16 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001680)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$proc_mixer(r0, &(0x7f0000000200)=""/49, 0x31) 20:28:16 executing program 3: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 20:28:16 executing program 4: shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 20:28:16 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc8880, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 20:28:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459c", @ANYBLOB], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 416.857154][T24870] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 416.892864][T24877] IPVS: ftp: loaded support on port[0] = 21 20:28:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') readv(r0, &(0x7f00000006c0)=[{&(0x7f0000001400)=""/4100, 0x1004}], 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=""/83) 20:28:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa75f070000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 416.907295][T24874] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.916029][T24874] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.924780][T24874] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.933455][T24874] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.985829][T24872] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 416.991235][T24872] loop4: partition table partially beyond EOD, truncated [ 417.014153][T24872] loop4: p1 start 1 is beyond EOD, truncated [ 417.020138][T24872] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 417.044233][T24874] device vxlan0 entered promiscuous mode [ 417.050040][T24872] loop4: p3 size 2 extends beyond EOD, truncated [ 417.057546][T24872] loop4: p4 size 32768 extends beyond EOD, truncated [ 417.066893][T24872] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 417.074932][T24874] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.083836][T24874] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.092798][T24874] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.101778][T24874] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.135596][T24887] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 417.141402][T24887] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 417.162118][T24872] loop4: p6 size 32768 extends beyond EOD, truncated 20:28:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000900)) [ 417.228994][T24887] loop5: p5 size 1073741824 extends beyond EOD, truncated 20:28:17 executing program 0: 20:28:17 executing program 3: 20:28:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa75f070000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 417.428200][T24874] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 417.437022][T24874] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 417.445806][T24874] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 417.454514][T24874] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 417.495919][T24938] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 417.503028][T24938] loop4: partition table partially beyond EOD, truncated [ 417.543375][T24938] loop4: p1 start 1 is beyond EOD, truncated [ 417.571434][T24938] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 417.571742][T24874] device vxlan0 entered promiscuous mode [ 417.598198][T24938] loop4: p3 size 2 extends beyond EOD, truncated [ 417.612814][T24874] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.613603][T24938] loop4: p4 size 32768 extends beyond EOD, [ 417.621882][T24874] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.636660][T24874] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.645539][T24874] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.660267][T24938] truncated [ 417.661565][T24938] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 417.684395][T24958] loop5: p1 < > p2 p3 < p5 p6 > p4 20:28:17 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:17 executing program 0: 20:28:17 executing program 3: [ 417.703679][T24958] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 417.706033][T24938] loop4: p6 size 32768 extends beyond EOD, [ 417.712303][T24958] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 417.737014][T24938] truncated [ 417.737025][T24938] loop4: p6 could not be added: 12 20:28:17 executing program 4: 20:28:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459c", @ANYBLOB], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:28:17 executing program 3: [ 417.775952][ T4892] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 417.793716][ T4892] loop5: p2 size 1073741824 extends beyond EOD, truncated 20:28:17 executing program 0: [ 417.828495][ T4892] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 417.851005][T24995] IPVS: ftp: loaded support on port[0] = 21 [ 417.861717][T24997] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 20:28:17 executing program 3: 20:28:17 executing program 5: [ 417.870456][T24997] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 417.879247][T24997] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 417.887955][T24997] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 20:28:17 executing program 5: 20:28:17 executing program 5: [ 417.962463][T24997] device vxlan0 entered promiscuous mode 20:28:18 executing program 3: [ 418.024028][T24997] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 418.032927][T24997] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 418.041847][T24997] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 418.050773][T24997] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 20:28:18 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:18 executing program 0: 20:28:18 executing program 4: 20:28:18 executing program 5: 20:28:18 executing program 3: 20:28:18 executing program 2: 20:28:18 executing program 2: 20:28:18 executing program 4: bpf$MAP_CREATE(0x6, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 20:28:18 executing program 0: 20:28:18 executing program 5: 20:28:18 executing program 3: [ 418.749411][T25064] IPVS: ftp: loaded support on port[0] = 21 20:28:18 executing program 0: 20:28:19 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:19 executing program 4: 20:28:19 executing program 2: 20:28:19 executing program 5: 20:28:19 executing program 3: 20:28:19 executing program 0: 20:28:19 executing program 5: 20:28:19 executing program 3: 20:28:19 executing program 2: 20:28:19 executing program 4: 20:28:19 executing program 0: [ 419.610132][T25114] IPVS: ftp: loaded support on port[0] = 21 20:28:19 executing program 3: 20:28:19 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:19 executing program 5: 20:28:19 executing program 4: 20:28:19 executing program 2: 20:28:19 executing program 0: 20:28:19 executing program 3: 20:28:19 executing program 5: 20:28:19 executing program 4: 20:28:19 executing program 2: 20:28:19 executing program 0: 20:28:19 executing program 3: [ 419.930773][T25150] IPVS: ftp: loaded support on port[0] = 21 20:28:19 executing program 5: 20:28:20 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:20 executing program 4: 20:28:20 executing program 0: 20:28:20 executing program 2: 20:28:20 executing program 3: 20:28:20 executing program 5: 20:28:20 executing program 3: 20:28:20 executing program 0: 20:28:20 executing program 4: 20:28:20 executing program 2: [ 420.187655][T25185] IPVS: ftp: loaded support on port[0] = 21 20:28:20 executing program 5: 20:28:20 executing program 3: 20:28:20 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:20 executing program 0: 20:28:20 executing program 2: 20:28:20 executing program 4: 20:28:20 executing program 3: 20:28:20 executing program 0: 20:28:20 executing program 2: 20:28:20 executing program 3: 20:28:20 executing program 4: 20:28:20 executing program 5: [ 420.484175][T25220] IPVS: ftp: loaded support on port[0] = 21 20:28:20 executing program 3: 20:28:20 executing program 2: 20:28:20 executing program 0: 20:28:20 executing program 4: 20:28:20 executing program 5: 20:28:20 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:20 executing program 3: 20:28:20 executing program 2: 20:28:20 executing program 0: 20:28:20 executing program 5: 20:28:20 executing program 3: 20:28:20 executing program 4: 20:28:20 executing program 2: [ 420.798226][T25257] IPVS: ftp: loaded support on port[0] = 21 20:28:20 executing program 3: 20:28:20 executing program 5: 20:28:20 executing program 0: 20:28:20 executing program 2: 20:28:20 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:20 executing program 4: 20:28:20 executing program 0: 20:28:20 executing program 3: 20:28:20 executing program 5: 20:28:21 executing program 2: 20:28:21 executing program 4: 20:28:21 executing program 0: 20:28:21 executing program 3: [ 421.127582][T25294] IPVS: ftp: loaded support on port[0] = 21 20:28:21 executing program 5: 20:28:21 executing program 2: 20:28:21 executing program 4: 20:28:21 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:21 executing program 0: 20:28:21 executing program 5: 20:28:21 executing program 3: 20:28:21 executing program 2: 20:28:21 executing program 4: 20:28:21 executing program 5: 20:28:21 executing program 0: 20:28:21 executing program 3: [ 421.410070][T25331] IPVS: ftp: loaded support on port[0] = 21 20:28:21 executing program 4: 20:28:21 executing program 2: 20:28:21 executing program 0: 20:28:22 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:22 executing program 3: 20:28:22 executing program 5: 20:28:22 executing program 4: 20:28:22 executing program 2: 20:28:22 executing program 0: 20:28:22 executing program 5: 20:28:22 executing program 2: 20:28:22 executing program 0: 20:28:22 executing program 4: [ 422.273039][T25381] IPVS: ftp: loaded support on port[0] = 21 20:28:22 executing program 3: 20:28:22 executing program 5: 20:28:23 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:23 executing program 2: 20:28:23 executing program 3: 20:28:23 executing program 0: 20:28:23 executing program 4: 20:28:23 executing program 5: 20:28:23 executing program 0: 20:28:23 executing program 5: 20:28:23 executing program 3: 20:28:23 executing program 2: 20:28:23 executing program 4: [ 423.199091][T25434] IPVS: ftp: loaded support on port[0] = 21 20:28:23 executing program 3: 20:28:23 executing program 5: 20:28:23 executing program 0: 20:28:23 executing program 4: 20:28:23 executing program 3: 20:28:23 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:23 executing program 2: 20:28:24 executing program 5: 20:28:24 executing program 0: 20:28:24 executing program 3: 20:28:24 executing program 2: 20:28:24 executing program 4: [ 424.206561][T25482] IPVS: ftp: loaded support on port[0] = 21 20:28:24 executing program 0: 20:28:24 executing program 4: 20:28:24 executing program 5: 20:28:24 executing program 2: 20:28:24 executing program 3: 20:28:24 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:24 executing program 2: 20:28:24 executing program 0: 20:28:24 executing program 4: 20:28:24 executing program 5: 20:28:24 executing program 3: 20:28:25 executing program 5: 20:28:25 executing program 4: 20:28:25 executing program 2: 20:28:25 executing program 0: 20:28:25 executing program 3: [ 425.124335][T25523] IPVS: ftp: loaded support on port[0] = 21 20:28:25 executing program 4: 20:28:25 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:25 executing program 2: 20:28:25 executing program 5: 20:28:25 executing program 3: 20:28:25 executing program 0: 20:28:25 executing program 4: 20:28:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000300)={0x0, 0x1, 0x6, @random="de9b9cd714ba"}, 0x10) 20:28:25 executing program 5: r0 = socket(0x1, 0x1, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 20:28:25 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0xe000, 0x0) 20:28:25 executing program 0: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) [ 425.969304][T25562] IPVS: ftp: loaded support on port[0] = 21 20:28:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@empty}, 0x14) 20:28:26 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000066d01"], 0x48}}, 0x0) 20:28:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 20:28:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x5, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:28:26 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 20:28:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="0bf158c7cece67f7ba861cbcbe51", 0xe, 0x0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 20:28:26 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r2], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000000)={r2, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e079, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:28:26 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@generic={0x89, 0x2}]}}}}}}, 0x0) 20:28:26 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @llc={0x1a, 0x21, 0x6e, 0x6, 0x2, 0x9}, @in={0x2, 0x0, @local}, 0xfffe}) getpeername$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000140)=0x6e) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000200)="1f", 0x1, r2) syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) pipe2(&(0x7f0000000ec0)={0xffffffffffffffff}, 0x0) write$P9_RLCREATE(r3, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x4, 0xffffffff, 0x2}, 0x40}}, 0x18) r4 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fedbdf25700000000a00060008021100000100000a00060008021100000100000a00060008021100000100000a00060008021100000100000a000600ffffffffffff0000"], 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x8c4) 20:28:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={0x0, 0x668}}, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 20:28:26 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000680)='/dev/nvram\x00', 0x0, 0x0) clock_gettime(0x3, &(0x7f0000001700)) [ 426.849066][T25619] IPVS: ftp: loaded support on port[0] = 21 20:28:26 executing program 5: openat$nvram(0xffffffffffffff9c, 0x0, 0x541200, 0x0) 20:28:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 20:28:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x62, 0x10, 0x4}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd06, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 20:28:26 executing program 5: syz_emit_ethernet(0x1af, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd682c83da017921fffe8000000000000000000000000000bbfe8000000000000000000000000000aa"], 0x0) 20:28:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) read$eventfd(r0, &(0x7f0000000600), 0x8) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0xe, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 20:28:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RCLUNK(r0, 0x0, 0x0) [ 427.082200][T25665] dccp_invalid_packet: P.Data Offset(0) too small [ 427.103480][T25665] dccp_invalid_packet: P.Data Offset(0) too small 20:28:27 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r2], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000000)={r2, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:27 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/pfkey\x00', 0x0, 0x0) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) 20:28:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[], 0x158}}, 0x0) 20:28:27 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x80080, 0x0) 20:28:27 executing program 5: 20:28:27 executing program 4: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, 0x0) sendmsg$key(r0, 0x0, 0x0) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x2, 0x2}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) wait4(0x0, 0x0, 0x0, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setregs(0xf, 0x0, 0x5, 0x0) 20:28:27 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000000140021070000000000000000100d"], 0x24}}, 0x0) 20:28:27 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x1, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 20:28:27 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}, @nfc, @in={0x2, 0x0, @remote}}) 20:28:27 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') pipe2(&(0x7f0000000ec0)={0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3fb, 0x10, 0x70bd29, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000000) r1 = socket(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @rand_addr=0x64010102}, @generic={0x1f, "9ff4aef4af564e9c420718193c0f"}, @l2tp={0x2, 0x0, @multicast2, 0x2}, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) [ 427.748100][T25692] IPVS: ftp: loaded support on port[0] = 21 20:28:27 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@multicast, @empty, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @loopback}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}, 0x0) 20:28:27 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/nvram\x00', 0x400, 0x0) 20:28:28 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r2], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000000)={r2, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:28 executing program 5: futex(&(0x7f0000000180), 0x5, 0x0, 0x0, &(0x7f0000000140), 0x10002) 20:28:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000f00)=ANY=[@ANYBLOB="68060000", @ANYRES16=0x0, @ANYBLOB="01"], 0x668}}, 0x0) 20:28:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$netlink(r0, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f00000001c0)={0x38, 0x0, 0x0, 0x0, 0x0, "", [@generic="1c5c8bc2f8d47dd9a9a9f96d1a95587372dc509fb02e58e8dc13a8bb24", @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x38}, {&(0x7f00000002c0)={0xe8c, 0x0, 0x0, 0x0, 0x0, "", [@generic="e9991a1ba8cc668c09932ea6da7e4171f01159cc05313051c05a0fd093d17ba87c189273cb09cdddd4fa11d972d3f9c97f90d3a6c36b03256bb32be02888864bd1520afa0031f85c4aa8a40b2f03084887f2381d786fd1fdee0d6167bab814990aaa2af3a8e9339961c0d6e626d93f2d9a4e6640eebaebf18ad06b27179dc4141723df293e88456bbdbdc32cda0b7f9df72dab93798bdbb9e2cfce6d91c97bf6398e6f1396b290a154e9503664dcf72628", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @nested={0xe4, 0x0, 0x0, 0x1, [@typed={0xcd, 0x0, 0x0, 0x0, @binary="4f6d5eeb4502dd687d41f886318617e6da0d3601f2e3ceac25d54183bd6b256e550a3882aae883ef700a44cfad44ec007b3b59e303ecd8cd5279ea48286b7bbdfae5f30cc10fbf52603192a3ab7660378dfe2067d3482d0f6eacc327fcbf4c1af0f4b681fabb8d5177cf0cca8abcd30972c5de3c90283463deecb4d0dcffd55d424ac0bcc5b01dafbe26892c2f823a3922aaf6137759af8c001f3430f7981a0fef8a3e7680c80ce9d1ee50032f659e606e915a54f4497af310d01660d7b5b22268963c6c60e57d7aaa"}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, @generic="30d14339a0f064155b953f30ff878d5f654019bcdaf64384ae1d2301fb", @generic="34d84e271de94c", @nested={0x1f5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xe9, 0x0, 0x0, 0x0, @binary="83fb1a46dd256e42c816097f2030bfa39d9e7b55929f5dffb553beeda98ac89e3dd69fb5aeacb4f12ab1757811761dfaee0b3cf628d182c598ef79eb162748cf434b5699a4ca9d2094930627dc266538b3be5d93f1afd973b0ad82ba930b5455c21ec243c249cdaff6720731fd5d7a5ffda5d438589daba907bc1c69c834c9aa8e2285d9b953811476fd4e45b93f302a574f8be940b59a9b10f7093940849ced2b62d7b226405004b59b9ef51fbde3cced9bf95bd764047b383abe7db945f24a1d286cf3c759943ab159b19d8dd7fdd3d70245e0f098e0856637192ae0867b5db6bd4fae01"}, @generic="905e05ab386def4e9c78be51750599d0b83866a628447eb2be717d4ea5e94104c33e9ea44e003d12cd0eab8629a223408012138e50c273bdd8500a836d0a5ef66f54734b8dade1e4845bf0a0f1a6edcf5c1563f5c74084263f503cfd8393d56cf7d8360822a47ce83c4f41fd582291278eaf6f9247226b20bbed6e258ea0a2383c8ec7e2a63aedce0e4c06a0b96837e56e8e86aec3db928909359c80074a06dd258de5e65a4d480e06e9d5bc4e98a745593199e0b7586fbf1a384db5ab008247b0c04ca9d7fd5027b556a5ee65242cf84a13065dbffe6b10bbae19b69da1d1", @generic="2b70c4c7ddb72d54dd586c7fa31fcfc921ebf7068be6"]}, @generic="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"]}, 0xe8c}], 0x2}, 0x0) 20:28:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:28:28 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@multicast, @empty, @void, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'o\x00', 0x0, "76bf6d"}}}}}}, 0x0) 20:28:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) 20:28:28 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x14, 0x1}, 0x14}}, 0x0) 20:28:28 executing program 5: r0 = getpgrp(0xffffffffffffffff) r1 = getpgid(0x0) tgkill(r0, r1, 0x61) 20:28:28 executing program 3: clock_gettime(0x0, &(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 20:28:28 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x24, 0x14, 0x721, 0x0, 0x0, {0x10}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "42005b728b6ee2fa55"}]}, 0x24}}, 0x0) recvmsg(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f00000008c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/107, 0x6b}, 0x0) [ 428.631057][T25754] IPVS: ftp: loaded support on port[0] = 21 20:28:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="ff"], 0x28}}, 0x0) 20:28:29 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:29 executing program 5: syz_emit_ethernet(0x13e, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "316199", 0x108, 0x33, 0x1, @remote, @private0={0xfc, 0x0, [], 0x1}, {[@fragment={0x0, 0x0, 0x1e, 0x0, 0x0, 0x8, 0x65}, @fragment={0x0, 0x0, 0xa5, 0x0, 0x0, 0x5, 0x68}, @routing={0x87, 0x8, 0x0, 0xe8, 0x0, [@private1={0xfc, 0x1, [], 0x1}, @private2, @local, @remote]}, @dstopts={0xff}, @srh={0x2b, 0x2, 0x4, 0x1, 0xc1, 0x8, 0x0, [@local]}, @srh={0x0, 0x4, 0x4, 0x2, 0x1f, 0x0, 0x0, [@dev, @empty]}, @routing={0x0, 0xc, 0x0, 0xd3, 0x0, [@loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, @empty, @rand_addr=' \x01\x00', @mcast2]}]}}}}}, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/33) 20:28:29 executing program 4: syz_emit_ethernet(0x83, &(0x7f0000000100)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f6f235", 0x4d, 0x6, 0x0, @local, @mcast2, {[@fragment, @fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"77b0b70a066568793850e8d2ad1adc66f4614a8fb36cd2df593533567dbb0ecaecf52c425e44412593"}}}}}}}, 0x0) 20:28:29 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x682, 0x0) 20:28:29 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000200)={0x0, 0xfd9a}}, 0x0) 20:28:29 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x24a200, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x0) 20:28:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:28:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x5, &(0x7f00000000c0)=@raw=[@func, @map, @map], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x32) 20:28:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:28:29 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, @llc={0x1a, 0x21, 0x6e, 0x6, 0x2, 0x9}, @in={0x2, 0x0, @remote}, 0xfffe}) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') [ 429.522311][T25816] IPVS: ftp: loaded support on port[0] = 21 20:28:29 executing program 2: ioperm(0x0, 0x7fff, 0x0) 20:28:29 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4800000014000100000000f4ffffffff01003100010042005b"], 0x48}}, 0x0) 20:28:30 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:30 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev}, @llc={0x1a, 0x21, 0x6e, 0x6, 0x2, 0x9}, @in={0x2, 0x0, @remote}, 0xfffe}) 20:28:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x5, 0x176, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x0, 0x0, 0x0, 'erspan0\x00', 'batadv_slave_1\x00', 'geneve1\x00', 'team0\x00', @broadcast, [], @empty, [], 0x6e, 0x6e, 0xe6, [], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "0ef877fcdb7f86934dd6ad4c1a452ea31be8ed332bee769e42db728d4ae6427137ace9886017bcfa6bbbb7a4c60377a863da967427d42d31aa226b45b7dd8716"}}}}]}, {0x0, '\x00', 0x1}]}, 0x1ee) 20:28:30 executing program 2: mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0}) 20:28:30 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @generic={{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@generic={0x86, 0x8, "b30daad9887d"}]}}}}}}, 0x0) 20:28:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 20:28:30 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit_group(0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="540000000206050000000000000000000000000005000400000018000900020073797a3000000000050005000200000005000100060000000d000300686173683a6e6574000000000c0007800800064000fe"], 0x54}}, 0x0) 20:28:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:28:30 executing program 2: syz_emit_ethernet(0x34, &(0x7f0000000040)={@local, @link_local, @void, {@generic={0x8906, "2d8736959ca7accf6c515eb20bc7bf9b797b0f3d886ee072ab83ba47989b6f944a2028814ad6"}}}, 0x0) 20:28:30 executing program 5: r0 = socket(0x2, 0x3, 0x5) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4044001) [ 430.371496][T25871] IPVS: ftp: loaded support on port[0] = 21 20:28:30 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x170, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xd6, 0x1, "98bdb0831b2e6fa8ff51fd9cb4eabe286e4fd159af803d3c4bb2d01a495a3c29a73d22501e6eca4d1ae256449c59e37cb973d36e209c2a7cf012b8a17d4fb7bc7f002bd125fe61ce6fa1e41d3b1b1f1ddc1c9493246f56d97ccfd723ef4962c32fa70eb728ed235733a4b9bef81b63fd1f7357a2e92d1da52a1aaeae8a35054831c26ac1c54f84dc722fa25b7b862fdd998f4bc29d3d45a1061fcc7e6622095bd4445948c3f005808adbd07a74a81cf5a5dc4bd71bf91d0f86fb2c93ff44f6e3957592072ef9c3f08428c244c0738c400d63"}, @INET_DIAG_REQ_BYTECODE={0x83, 0x1, "a34ab1a01cfdedd82dc3b059ced6da75fa1e0ed0c98f05f8e1fc63ba78d1068d30eb53f4e94f1b351efa1c4fc12d653f5b4d86db1645136d071e6ed2cee9218da125c577cb8f1a6dc6f0594911750d7ba60d1e85528d82dfe70b274e99a97a96a16753934e7f18c5628e75fabd67f47a2bf8ff91bf211d3a04bf3ca6860736"}]}, 0x1bb}, 0x1, 0x0, 0x0, 0x20008811}, 0x24000080) 20:28:30 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, 0x14, 0x721, 0x0, 0x0, {0x10}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "0f468e93774695dec9"}]}, 0x24}}, 0x0) 20:28:31 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:31 executing program 4: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/51) 20:28:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:28:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:28:31 executing program 3: r0 = socket(0x11, 0x3, 0x0) getpeername$netlink(r0, 0x0, 0x0) 20:28:31 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000004c0)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0x200, 0x0, 0xffffffff, 0x108, 0x0, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @multicast2, @local, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @empty, @local, @port, @gre_key}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'ip6tnl0\x00', 'xfrm0\x00'}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "939b"}}, @common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @remote, @port, @gre_key}}}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'lo\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @empty, @multicast2, @port, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xfffffffffffffce5) 20:28:31 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4800000014000143919215000000000002"], 0x48}}, 0x0) 20:28:31 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x43}}, @sco={0x1f, @none}, @in={0x2, 0x0, @local}, 0xfffe}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x7, 0x0, 0x0, 0x6}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') 20:28:31 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x62}}, 0x0) 20:28:31 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000200)=@abs, 0x6e, 0x0}, 0x0) 20:28:31 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) write$FUSE_POLL(r0, 0x0, 0x0) [ 431.261280][T25936] IPVS: ftp: loaded support on port[0] = 21 20:28:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$input_event(r0, &(0x7f0000008280)={{0x0, 0xea60}}, 0x18) 20:28:31 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00') 20:28:31 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) accept4$inet(r0, 0x0, 0x0, 0x80800) socket$inet(0x2, 0xa, 0x0) 20:28:31 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 20:28:31 executing program 0: mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000000)=@nfc, 0x80) 20:28:31 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0xfffffffffffffee4, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast2}}}}}, 0x0) 20:28:32 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x24, 0x14, 0x721, 0x0, 0x0, {0x10}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "e01c76dc5d7a71bd6e"}]}, 0x24}}, 0x0) 20:28:32 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 20:28:32 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:28:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:28:32 executing program 0: syz_emit_ethernet(0xbe, &(0x7f0000000280)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast, @local}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "36ec94449492ba01c6e03bb431b2b05dfb47de5ab7b76d3b772c9e7adf7d5872", "7c8ac177950ad64b8b039fdac6402f2f3e8ce33a5139f8ddf2b1a728cc5f0d448208d3dc6e0870c2d6854e590bb14ba1", "1460723eba1bf678da1032b8bbc298192b5bf1396ee26a6ddcf9d3e3", {"172c9a9580e4d506407ec5427fd2a923", "d933050891051b42e386dd98ff5226c3"}}}}}}}, 0x0) [ 432.140076][T25997] IPVS: ftp: loaded support on port[0] = 21 20:28:32 executing program 2: r0 = socket(0xa, 0x3, 0x5) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={0x0}}, 0x0) 20:28:32 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:32 executing program 3: r0 = socket(0x11, 0x3, 0x0) accept(r0, 0x0, 0x0) 20:28:32 executing program 5: r0 = socket(0x2, 0x3, 0x6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 20:28:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) 20:28:32 executing program 0: mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 20:28:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 20:28:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) 20:28:32 executing program 5: getxattr(&(0x7f0000000180)='.\x00', 0x0, 0x0, 0x0) 20:28:32 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, 0x14, 0x721, 0x0, 0x0, {0x11}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "42005b728b6bebfa54"}]}, 0x24}}, 0x0) [ 432.991965][T26055] IPVS: ftp: loaded support on port[0] = 21 20:28:32 executing program 0: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) mlock(&(0x7f0000001000/0x2000)=nil, 0x2000) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) 20:28:32 executing program 4: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2710}) 20:28:33 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '8qZ', 0x20, 0x6, 0x0, @dev={0xfe, 0x80, [], 0x40}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/pfkey\x00', 0x0, 0x0) 20:28:33 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:33 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev}, @llc={0x1a, 0x21, 0x6e, 0x6, 0x2, 0x9}, @in={0x2, 0x0, @remote}, 0xfffe}) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') 20:28:33 executing program 4: syz_emit_ethernet(0x56, &(0x7f0000000080)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '8qZ', 0x20, 0x6, 0x0, @local, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 20:28:33 executing program 5: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x81000) 20:28:33 executing program 0: r0 = socket(0x1, 0x3, 0x0) getpeername$packet(r0, 0x0, 0x0) 20:28:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:28:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x28}}, 0x0) 20:28:33 executing program 0: r0 = getpgid(0x0) ptrace$peeksig(0x4209, r0, 0x0, 0x0) 20:28:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x100000000, 0x80000000029}) 20:28:33 executing program 3: getxattr(&(0x7f0000000180)='.\x00', &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000200)=""/32, 0x20) [ 433.871791][T26118] IPVS: ftp: loaded support on port[0] = 21 20:28:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newtaction={0x14, 0x30, 0x709}, 0x14}}, 0x0) 20:28:33 executing program 4: r0 = socket(0x1, 0x3, 0x0) accept4(r0, 0x0, 0x0, 0x0) 20:28:34 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:34 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x94, 0x2}]}}}}}}, 0x0) 20:28:34 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000005c0)=""/102400) 20:28:34 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 20:28:34 executing program 4: r0 = socket(0x1, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 20:28:34 executing program 5: syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '8qZ', 0x20, 0x6, 0x0, @local, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 20:28:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:28:34 executing program 4: r0 = socket(0x1, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) 20:28:34 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = getpgid(0x0) tgkill(r0, r1, 0x0) [ 434.741296][T26179] IPVS: ftp: loaded support on port[0] = 21 20:28:34 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000d80, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x200, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:28:34 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @dev}, @nfc, @in={0x2, 0x0, @remote}}) 20:28:34 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x412483, 0x0) 20:28:35 executing program 4: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/input/mice\x00', 0x0) 20:28:35 executing program 0: r0 = syz_genetlink_get_family_id$team(0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @empty, @multicast1}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000540)={0x14, r0, 0x0, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x4000014) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, 0x0, 0x40400) clock_gettime(0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ec0)='team\x00') socketpair(0x0, 0x0, 0x79, &(0x7f0000001000)) 20:28:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001800)='team\x00') 20:28:35 executing program 2: pipe2$9p(&(0x7f0000000100), 0x84800) 20:28:35 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:35 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) clock_gettime(0x4, &(0x7f00000013c0)) 20:28:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) 20:28:35 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, 0x0) clock_gettime(0x0, &(0x7f0000000c40)) socketpair(0x0, 0x0, 0x0, &(0x7f0000001000)) 20:28:35 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000002540)='/dev/snapshot\x00', 0x88002, 0x0) 20:28:35 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 435.609088][T26241] IPVS: ftp: loaded support on port[0] = 21 20:28:35 executing program 0: io_uring_setup(0x10b7, &(0x7f0000000640)) 20:28:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:28:35 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x10000, 0x0) 20:28:35 executing program 3: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300), 0x4) 20:28:35 executing program 0: socket$inet(0x2, 0x6, 0x29) 20:28:35 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x79) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000040)="cddd", 0x2, 0x0, 0x0, 0x0) 20:28:36 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:36 executing program 4: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2a944c53db7ab9b2971eb2f417324d1911ec97fc788716b0faede5f39112b071b2d475c64b42c7b4fe8acb614a92d115cbd3cf4a45752306f35c915f4b89c1ca", "69ff52c1a8612f62b8073b47ff2b5148e6881ac2942ec1243b1f189be7d2d755"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 20:28:36 executing program 3: shmget(0x0, 0x1000, 0x0, &(0x7f0000ff9000/0x1000)=nil) 20:28:36 executing program 5: clock_gettime(0x0, &(0x7f00000013c0)) 20:28:36 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001080)='/dev/nvram\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 20:28:36 executing program 2: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) 20:28:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000640)) 20:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x3, &(0x7f00000001c0)=[{}]}) 20:28:36 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$qrtrtun(r0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001800)='team\x00') 20:28:36 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) write$qrtrtun(r0, 0x0, 0x0) 20:28:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, 0x0, 0x0) [ 436.478658][T26328] IPVS: ftp: loaded support on port[0] = 21 20:28:36 executing program 0: 20:28:37 executing program 4: syz_genetlink_get_family_id$team(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ec0)='team\x00') 20:28:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000280), 0xc) 20:28:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0x10) 20:28:37 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, 0x0) 20:28:37 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:37 executing program 0: 20:28:37 executing program 2: 20:28:37 executing program 4: 20:28:37 executing program 5: 20:28:37 executing program 0: 20:28:37 executing program 3: [ 437.362803][T26387] IPVS: ftp: loaded support on port[0] = 21 20:28:37 executing program 2: 20:28:37 executing program 4: 20:28:37 executing program 0: 20:28:37 executing program 5: 20:28:37 executing program 3: 20:28:38 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:38 executing program 2: 20:28:38 executing program 5: 20:28:38 executing program 4: 20:28:38 executing program 0: 20:28:38 executing program 3: 20:28:38 executing program 0: 20:28:38 executing program 5: 20:28:38 executing program 5: [ 438.227218][T26439] IPVS: ftp: loaded support on port[0] = 21 20:28:38 executing program 3: 20:28:38 executing program 2: 20:28:38 executing program 4: 20:28:38 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:38 executing program 0: 20:28:38 executing program 5: 20:28:38 executing program 4: 20:28:38 executing program 2: 20:28:38 executing program 3: 20:28:39 executing program 5: 20:28:39 executing program 2: 20:28:39 executing program 4: 20:28:39 executing program 0: 20:28:39 executing program 3: [ 439.100567][T26486] IPVS: ftp: loaded support on port[0] = 21 20:28:39 executing program 3: 20:28:39 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:39 executing program 2: 20:28:39 executing program 0: 20:28:39 executing program 5: 20:28:39 executing program 4: 20:28:39 executing program 3: 20:28:39 executing program 3: 20:28:39 executing program 0: 20:28:39 executing program 5: 20:28:39 executing program 4: 20:28:39 executing program 2: [ 439.968988][T26534] IPVS: ftp: loaded support on port[0] = 21 20:28:40 executing program 4: 20:28:40 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:40 executing program 0: 20:28:40 executing program 3: 20:28:40 executing program 5: 20:28:40 executing program 2: 20:28:40 executing program 4: 20:28:40 executing program 0: 20:28:40 executing program 5: 20:28:40 executing program 2: 20:28:40 executing program 4: 20:28:40 executing program 3: [ 440.834974][T26582] IPVS: ftp: loaded support on port[0] = 21 20:28:40 executing program 0: 20:28:41 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:41 executing program 5: 20:28:41 executing program 2: 20:28:41 executing program 4: 20:28:41 executing program 3: 20:28:41 executing program 0: 20:28:41 executing program 3: 20:28:41 executing program 2: 20:28:41 executing program 0: 20:28:41 executing program 5: 20:28:41 executing program 4: [ 441.713911][T26630] IPVS: ftp: loaded support on port[0] = 21 20:28:41 executing program 3: 20:28:42 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:42 executing program 5: 20:28:42 executing program 0: 20:28:42 executing program 2: 20:28:42 executing program 3: 20:28:42 executing program 4: 20:28:42 executing program 0: 20:28:42 executing program 5: [ 442.566398][T26678] IPVS: ftp: loaded support on port[0] = 21 20:28:42 executing program 3: 20:28:42 executing program 4: 20:28:42 executing program 2: 20:28:42 executing program 0: 20:28:43 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:43 executing program 5: 20:28:43 executing program 4: 20:28:43 executing program 3: 20:28:43 executing program 0: 20:28:43 executing program 2: 20:28:43 executing program 5: 20:28:43 executing program 2: 20:28:43 executing program 0: 20:28:43 executing program 4: 20:28:43 executing program 3: [ 443.428595][T26725] IPVS: ftp: loaded support on port[0] = 21 20:28:43 executing program 4: 20:28:44 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:44 executing program 3: 20:28:44 executing program 5: 20:28:44 executing program 0: 20:28:44 executing program 2: 20:28:44 executing program 4: 20:28:44 executing program 4: 20:28:44 executing program 2: 20:28:44 executing program 0: [ 444.281712][T26773] IPVS: ftp: loaded support on port[0] = 21 20:28:44 executing program 5: 20:28:44 executing program 3: 20:28:44 executing program 4: 20:28:44 executing program 1: getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:44 executing program 2: 20:28:44 executing program 5: 20:28:44 executing program 3: 20:28:44 executing program 4: 20:28:44 executing program 0: 20:28:45 executing program 0: 20:28:45 executing program 4: 20:28:45 executing program 5: 20:28:45 executing program 2: 20:28:45 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x0) 20:28:45 executing program 5: 20:28:45 executing program 1: getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:45 executing program 0: 20:28:45 executing program 2: 20:28:45 executing program 4: 20:28:45 executing program 5: 20:28:45 executing program 3: 20:28:45 executing program 2: 20:28:45 executing program 0: 20:28:45 executing program 5: 20:28:45 executing program 3: 20:28:45 executing program 4: 20:28:46 executing program 5: syz_io_uring_setup(0x6778, &(0x7f0000000000), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), 0x0) 20:28:46 executing program 1: getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001a00)='./cgroup.net/syz0\x00', 0x200002, 0x0) 20:28:46 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000001900)={0x0, 0x0, {}, {}, {0x0, @struct}}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:28:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000a00)=ANY=[@ANYBLOB="08030000169b4b"], 0x308}}, 0x0) 20:28:46 executing program 3: syz_io_uring_setup(0x4c08, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2af}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 20:28:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x7, @fixed, 0x0, 0x2}, 0xe) 20:28:46 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x0, 0x0) 20:28:46 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) 20:28:46 executing program 0: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, &(0x7f00000003c0)='n', 0x1) write$9p(r0, &(0x7f00000019c0)="8c", 0x1) 20:28:46 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, 0x0) 20:28:46 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)) 20:28:46 executing program 4: syz_open_dev$dmmidi(0x0, 0x0, 0x0) 20:28:47 executing program 1: unshare(0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:47 executing program 5: syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x0, 0x8200) 20:28:47 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) accept4$nfc_llcp(r0, 0x0, 0x0, 0x40000) 20:28:47 executing program 0: syz_open_dev$vcsa(&(0x7f0000001340)='/dev/vcsa#\x00', 0x0, 0x60000) 20:28:47 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=@raw=[@exit], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:28:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x200e0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 20:28:47 executing program 5: openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) syz_io_uring_setup(0x2798, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000001640), &(0x7f0000001680)) 20:28:47 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_tracing={0x1a, 0x7, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:28:47 executing program 0: r0 = epoll_create(0x7fff) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x3, &(0x7f0000000080), 0x8) 20:28:47 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) 20:28:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {0x0}], 0x2}, 0x0) 20:28:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x200e0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f0000010300)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 20:28:48 executing program 1: unshare(0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:48 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, 0x0, &(0x7f0000000980)) 20:28:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x40305839, 0x0) 20:28:48 executing program 3: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$9p(r0, 0x0, 0x0) 20:28:48 executing program 4: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000140)=""/82) 20:28:48 executing program 5: request_key(&(0x7f0000001140)='logon\x00', &(0x7f0000001180)={'syz', 0x1}, 0x0, 0x0) 20:28:48 executing program 2: request_key(&(0x7f0000001140)='logon\x00', &(0x7f0000001180)={'syz', 0x1}, &(0x7f00000011c0)='syz', 0x0) 20:28:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 20:28:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x3c, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f0000010300)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 20:28:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x85f}) 20:28:48 executing program 2: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000780)=0x8) r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333300000000000109022d0001000000000904000009030000000921000000012229000905810300000000000905020301"], 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, &(0x7f00000000c0)={0x0, 0xe, 0x61, {0x61, 0x3, "a8be207b9e039afa92c914e0ee1b2c733a21e6c93d48c240383c7d39c061896e58b6b60297629593bf9f9b1c1852754c2f87c29e9d4367af7c5699b045b7930d5dc1a75ccd6a3536685527648b8e5bf3b2623464f2cf4a3794f48a5e195dbd"}}, &(0x7f0000001f00)=ANY=[@ANYBLOB="00031d008000bab60e1d03bd62ccabfc7a48c4fbd23d1c944a19b4e3bc8659837a80a9ffc983f44d4ca2852d403e3c3a21b51b349d511cab2ea96bf9689b29ee3f8cf004b8f9acd4db40c8cb194b9a3f11a9dde47adc25250e574b2875029a6ad4253a69d68490c5282bcaf43badaaac151828623a4cfbdfff6e503fd42b9b7863f40dfe74eb79356aea358efecdeef9d0bbe7804b85ddbe4ad3d8aca7e29498bb6e35172b0689eb9e0ca31c5a11626fca055b49e4ef93a0932b9c5ae9a76fd6a5bf70163609fcd07733e54f74"], &(0x7f00000006c0)={0x0, 0x22, 0x1f, {[@global=@item_012={0x1, 0x1, 0x3, "be"}, @global=@item_4={0x3, 0x1, 0xa, "03f1790d"}, @local=@item_4={0x3, 0x2, 0x7, "1b1b91e1"}, @global=@item_012={0x1, 0x1, 0x0, 'q'}, @local=@item_4={0x3, 0x2, 0x2, "d1d044d0"}, @main=@item_4={0x3, 0x0, 0xc, "8a793f77"}, @global=@item_4={0x3, 0x1, 0x2, "a0b1993b"}, @local=@item_012={0x1, 0x2, 0x7, "dd"}]}}, &(0x7f0000000200)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x40, 0x1, {0x22, 0x19}}}}, &(0x7f00000003c0)={0x2c, &(0x7f0000000280)={0x20, 0xd, 0x77, "30ed2c7fa0ad80c6ae056c41387dfc08deb2d49d8672b3c5bc4f923e8995728e89d6f9e96c2b5eb2dd272a75eb2a7f2ee662acaef8073cd6a572b1ffcf23bf8b313fb3d7a3cd62d7b4fead31cefff7943c2556b6369b47e8a1a4ed6a932911b3967abcd14ce5e0e155a6b330d336fcaa01960671bc692e"}, &(0x7f0000000300)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x7f}, &(0x7f0000000440)={0x20, 0x1, 0x7d, "684c06d227adc57c8a426f50695fe1f669c457aa465b1242b65f8f7c2c61e3ffef258003a5e5d444c418b2d06784703525afd08918cc360b0743b0a9e8e87e0627db7765f9656d3682545bff1df64e2e638c84d701519889154cc673207e029ae3f68ab80fbd109348ebc01f20b46276abad08791f34a36c79d1914856"}, &(0x7f0000000500)={0x20, 0x3, 0x1, 0x4}}) syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x6, 0x48680) syz_usb_control_io(r0, &(0x7f0000000800)={0x2c, &(0x7f0000000880)=ANY=[@ANYBLOB='\x00\x00)'], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) syz_open_dev$hidraw(&(0x7f0000000680)='/dev/hidraw#\x00', 0x0, 0x4200) 20:28:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) wait4(0x0, 0x0, 0x0, 0x0) [ 449.125654][ T5] usb 3-1: new high-speed USB device number 18 using dummy_hcd 20:28:49 executing program 1: unshare(0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x0, 0x0) 20:28:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x3c, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 20:28:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x308}}, 0x0) 20:28:49 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x800, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r0, 0xee01) 20:28:49 executing program 4: 20:28:49 executing program 0: 20:28:49 executing program 5: [ 449.522835][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 20:28:49 executing program 4: 20:28:49 executing program 0: [ 449.585760][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 449.639095][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 449.687826][ T5] usb 3-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 9 [ 449.742708][ T5] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.00 [ 449.767124][ T5] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 449.784679][ T5] usb 3-1: config 0 descriptor?? [ 450.262839][ T5] keytouch 0003:0926:3333.0002: fixing up Keytouch IEC report descriptor [ 450.282421][ T5] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0002/input/input13 [ 450.395015][ T5] keytouch 0003:0926:3333.0002: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 450.466773][T20487] usb 3-1: USB disconnect, device number 18 [ 451.242419][ T5] usb 3-1: new high-speed USB device number 19 using dummy_hcd 20:28:51 executing program 2: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000780)=0x8) r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333300000000000109022d0001000000000904000009030000000921000000012229000905810300000000000905020301"], 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, &(0x7f00000000c0)={0x0, 0xe, 0x61, {0x61, 0x3, "a8be207b9e039afa92c914e0ee1b2c733a21e6c93d48c240383c7d39c061896e58b6b60297629593bf9f9b1c1852754c2f87c29e9d4367af7c5699b045b7930d5dc1a75ccd6a3536685527648b8e5bf3b2623464f2cf4a3794f48a5e195dbd"}}, &(0x7f0000001f00)=ANY=[@ANYBLOB="00031d008000bab60e1d03bd62ccabfc7a48c4fbd23d1c944a19b4e3bc8659837a80a9ffc983f44d4ca2852d403e3c3a21b51b349d511cab2ea96bf9689b29ee3f8cf004b8f9acd4db40c8cb194b9a3f11a9dde47adc25250e574b2875029a6ad4253a69d68490c5282bcaf43badaaac151828623a4cfbdfff6e503fd42b9b7863f40dfe74eb79356aea358efecdeef9d0bbe7804b85ddbe4ad3d8aca7e29498bb6e35172b0689eb9e0ca31c5a11626fca055b49e4ef93a0932b9c5ae9a76fd6a5bf70163609fcd07733e54f74"], &(0x7f00000006c0)={0x0, 0x22, 0x1f, {[@global=@item_012={0x1, 0x1, 0x3, "be"}, @global=@item_4={0x3, 0x1, 0xa, "03f1790d"}, @local=@item_4={0x3, 0x2, 0x7, "1b1b91e1"}, @global=@item_012={0x1, 0x1, 0x0, 'q'}, @local=@item_4={0x3, 0x2, 0x2, "d1d044d0"}, @main=@item_4={0x3, 0x0, 0xc, "8a793f77"}, @global=@item_4={0x3, 0x1, 0x2, "a0b1993b"}, @local=@item_012={0x1, 0x2, 0x7, "dd"}]}}, &(0x7f0000000200)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x40, 0x1, {0x22, 0x19}}}}, &(0x7f00000003c0)={0x2c, &(0x7f0000000280)={0x20, 0xd, 0x77, "30ed2c7fa0ad80c6ae056c41387dfc08deb2d49d8672b3c5bc4f923e8995728e89d6f9e96c2b5eb2dd272a75eb2a7f2ee662acaef8073cd6a572b1ffcf23bf8b313fb3d7a3cd62d7b4fead31cefff7943c2556b6369b47e8a1a4ed6a932911b3967abcd14ce5e0e155a6b330d336fcaa01960671bc692e"}, &(0x7f0000000300)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x7f}, &(0x7f0000000440)={0x20, 0x1, 0x7d, "684c06d227adc57c8a426f50695fe1f669c457aa465b1242b65f8f7c2c61e3ffef258003a5e5d444c418b2d06784703525afd08918cc360b0743b0a9e8e87e0627db7765f9656d3682545bff1df64e2e638c84d701519889154cc673207e029ae3f68ab80fbd109348ebc01f20b46276abad08791f34a36c79d1914856"}, &(0x7f0000000500)={0x20, 0x3, 0x1, 0x4}}) syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x6, 0x48680) syz_usb_control_io(r0, &(0x7f0000000800)={0x2c, &(0x7f0000000880)=ANY=[@ANYBLOB='\x00\x00)'], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) syz_open_dev$hidraw(&(0x7f0000000680)='/dev/hidraw#\x00', 0x0, 0x4200) 20:28:51 executing program 3: 20:28:51 executing program 0: 20:28:51 executing program 4: 20:28:51 executing program 5: 20:28:51 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) [ 451.699715][ T5] usb 3-1: unable to read config index 0 descriptor/start: -71 [ 451.717289][ T5] usb 3-1: can't read configurations, error -71 20:28:51 executing program 3: 20:28:51 executing program 4: 20:28:51 executing program 5: 20:28:51 executing program 0: [ 451.763283][T27101] IPVS: ftp: loaded support on port[0] = 21 20:28:51 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000940)) 20:28:51 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x3, 0x4) [ 452.122389][ T5] usb 3-1: new high-speed USB device number 20 using dummy_hcd [ 452.512472][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 452.525150][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 452.536834][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 452.562992][ T5] usb 3-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 9 [ 452.603423][ T5] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.00 [ 452.618925][ T5] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 452.640673][ T5] usb 3-1: config 0 descriptor?? [ 453.102897][ T5] keytouch 0003:0926:3333.0003: fixing up Keytouch IEC report descriptor [ 453.122679][ T5] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0003/input/input14 [ 453.213806][ T5] keytouch 0003:0926:3333.0003: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 453.344697][T20487] usb 3-1: USB disconnect, device number 20 20:28:53 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) write$UHID_INPUT(r0, &(0x7f0000000200)={0x8, {"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", 0x1000}}, 0x1006) 20:28:53 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vim2m\x00', 0x2, 0x0) 20:28:53 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000001380)='l2tp\x00') r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 20:28:53 executing program 3: socketpair(0x6, 0x0, 0x0, &(0x7f00000026c0)) 20:28:53 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000001540)='/dev/kvm\x00', 0x0, 0x0) 20:28:53 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:53 executing program 3: socketpair(0x18, 0x0, 0x12, &(0x7f0000000040)) 20:28:53 executing program 4: syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x240000) 20:28:53 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) [ 453.922631][T27198] IPVS: ftp: loaded support on port[0] = 21 20:28:53 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 20:28:53 executing program 2: 20:28:54 executing program 3: 20:28:54 executing program 4: 20:28:54 executing program 0: 20:28:54 executing program 2: 20:28:54 executing program 5: 20:28:54 executing program 3: 20:28:54 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:54 executing program 4: 20:28:54 executing program 2: 20:28:54 executing program 0: 20:28:54 executing program 5: 20:28:54 executing program 3: 20:28:54 executing program 3: 20:28:54 executing program 0: 20:28:54 executing program 4: 20:28:54 executing program 5: 20:28:54 executing program 2: [ 454.805979][T27257] IPVS: ftp: loaded support on port[0] = 21 20:28:54 executing program 4: 20:28:55 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:55 executing program 3: 20:28:55 executing program 0: 20:28:55 executing program 5: 20:28:55 executing program 2: 20:28:55 executing program 4: 20:28:55 executing program 2: 20:28:55 executing program 0: getrusage(0x0, &(0x7f0000001cc0)) 20:28:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001740)={0xe, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 20:28:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0x1ffc000}, {0x0}, {0x0}], 0x0, &(0x7f0000000500)={[{@check_int='check_int'}, {@nodatasum='nodatasum'}, {@noinode_cache='noinode_cache'}, {@treelog='treelog'}, {@ref_verify='ref_verify'}], [{@obj_type={'obj_type', 0x3d, ':}*@[!\xa9'}}, {@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'ns/uts\x00'}}]}) 20:28:55 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000000c0)={0x300, 0x480}) [ 455.689589][T27305] IPVS: ftp: loaded support on port[0] = 21 20:28:55 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 20:28:56 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:56 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$clear(0x7, r2) 20:28:56 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000008c0)={0xffffffffffffffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 20:28:56 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5460, 0xfffffffffffffffd) 20:28:56 executing program 4: syz_io_uring_setup(0x3142, &(0x7f00000000c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x514e, &(0x7f00000001c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 20:28:56 executing program 5: mmap$fb(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x4187032, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/223) 20:28:56 executing program 0: syz_io_uring_setup(0x30ee, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) 20:28:56 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8982, 0xfffffffffffffffd) 20:28:56 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 20:28:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 456.558632][T27364] IPVS: ftp: loaded support on port[0] = 21 20:28:56 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8980, 0xfffffffffffffffd) 20:28:56 executing program 3: lstat(&(0x7f0000000000)='.\x00', &(0x7f0000000040)) 20:28:57 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:57 executing program 0: syz_io_uring_setup(0x30ee, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) 20:28:57 executing program 2: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000001c0)="2a12", 0x2, 0x7fffffff}], 0x0, 0x0) 20:28:57 executing program 5: syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@flock_openafs='flock=openafs'}, {@dyn='dyn'}, {@autocell='autocell'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '.'}}]}) 20:28:57 executing program 3: wait4(0x0, 0x0, 0x0, &(0x7f00000023c0)) 20:28:57 executing program 4: add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000100)="3efd63c2103ce1038a068ecbe65ced6b718b6d3d21532938b866bf07b8940ce6c7d6ee3836965b51300ca992e28b9d060006e43151a2c76453d4c8d82d7f4a679b75adb3f56c45b8872d7591749d979b0d381897de6ad4e98ea6442a23cc5d06b3bba256228e1e269a5c866056fb3048581285d0fdca9bdc800ddc9f7f551eaa8dc19d949a890e64791400", 0x8b, 0xffffffffffffffff) [ 457.401489][T27438] Option 'Ì]³»¢V"Ž&š\†`Vû0HX…Ðýʛ܀ܟUªÁ”š‰dy' to dns_resolver key: bad/missing value [ 457.417805][T27439] afs: Unknown parameter 'smackfstransmute' [ 457.418854][T27440] IPVS: ftp: loaded support on port[0] = 21 [ 457.434844][T27439] afs: Unknown parameter 'smackfstransmute' 20:28:57 executing program 3: add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='c', 0x1, 0xfffffffffffffffc) [ 457.448139][T27438] Option 'Ì]³»¢V"Ž&š\†`Vû0HX…Ðýʛ܀ܟUªÁ”š‰dy' to dns_resolver key: bad/missing value 20:28:57 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000100)='./file1/file0\x00'}, 0x10) 20:28:57 executing program 5: syz_mount_image$afs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f00000000c0)="10", 0x1}, {&(0x7f0000000200)="02", 0x1, 0x8000000000000}], 0x0, 0x0) 20:28:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 20:28:57 executing program 2: syz_mount_image$btrfs(&(0x7f00000047c0)='btrfs\x00', &(0x7f0000004800)='./file0\x00', 0x0, 0x0, &(0x7f0000004d00), 0x808, &(0x7f0000004dc0)={[{@device={'device', 0x3d, './file0'}}, {@thread_pool={'thread_pool'}}, {@subvolid={'subvolid', 0x3d, 0x2}}], [{@pcr={'pcr'}}]}) [ 457.561523][T27464] encrypted_key: insufficient parameters specified [ 457.599317][T27464] encrypted_key: insufficient parameters specified 20:28:57 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000002800)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x56e8) 20:28:58 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:28:58 executing program 4: mmap$fb(&(0x7f0000fff000/0x1000)=nil, 0x7ffffffff000, 0x0, 0x4187032, 0xffffffffffffffff, 0x0) 20:28:58 executing program 0: request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 20:28:58 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x3, 0x0, 0x4) 20:28:58 executing program 2: clock_gettime(0x0, &(0x7f00000024c0)={0x0}) pselect6(0x40, &(0x7f0000002400)={0x3}, &(0x7f0000002440)={0x5}, 0x0, &(0x7f0000002500)={r0}, 0x0) 20:28:58 executing program 2: socket(0x26, 0x5, 0x800011) 20:28:58 executing program 0: add_key$user(&(0x7f0000000400)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 20:28:58 executing program 4: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000001180)="3e95c039dc6e3d102502d833752156ba434c70d5737115d2e192f583e3", 0x1d, 0xffffffffffffffff) 20:28:58 executing program 0: sendto$l2tp(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:28:58 executing program 2: syz_io_uring_setup(0x30ee, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 20:28:58 executing program 4: syz_io_uring_setup(0x3142, &(0x7f00000000c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) [ 458.881415][T27515] IPVS: ftp: loaded support on port[0] = 21 20:28:59 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000001100)={&(0x7f0000001140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/158, 0xfffffffffffffee1}, {&(0x7f00000000c0)=""/40, 0x31}, {&(0x7f0000000100)=""/175, 0xaf}], 0x3, &(0x7f0000002200)=""/4125, 0xfed}, 0x0) 20:28:59 executing program 2: clock_gettime(0x0, &(0x7f00000024c0)) pselect6(0x40, &(0x7f0000002400), 0x0, &(0x7f0000002480)={0x4}, 0x0, 0x0) 20:28:59 executing program 4: getitimer(0x1, &(0x7f0000000340)) 20:28:59 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) 20:28:59 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) connect$netrom(r0, 0x0, 0xfffffffffffffe61) 20:28:59 executing program 4: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x80000103) [ 459.626741][T27576] IPVS: ftp: loaded support on port[0] = 21 20:28:59 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xffffffffffffff4d) 20:28:59 executing program 4: socket$inet(0x2, 0x3, 0x2) 20:28:59 executing program 3: waitid(0x3, 0x0, 0x0, 0x9, 0x0) 20:28:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_IOCTL(r0, 0x0, 0x0) 20:28:59 executing program 5: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x103181, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 459.868573][T27622] nvme_fabrics: unknown parameter or missing value '' in ctrl creation request 20:28:59 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:28:59 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 20:28:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x123002, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002280)={0x158, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {0x0, 0x0, 0x4, 0x0, '!%}{'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {0x0, 0x0, 0xb, 0x0, '^\x1c%&*)\\}\\\'['}}]}, 0x158) 20:28:59 executing program 0: add_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="9670b4eaef0ab3e4bc4563b52ed39ef8fa4a573a6c456a65d50dc9e7709289a38c", 0x21, 0xfffffffffffffffe) 20:28:59 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) 20:28:59 executing program 2: r0 = add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="93", 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000200)='pkcs7_test\x00', 0x0, 0x0, 0x0, r0) 20:29:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000080)={0x0, 0x0, "71549c", 0x3, 0xe2}) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000180)) socketpair(0x8, 0x800, 0x0, &(0x7f00000001c0)) 20:29:00 executing program 4: 20:29:00 executing program 5: 20:29:00 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5451, 0xfffffffffffffffd) 20:29:00 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) [ 460.082263][T27639] IPVS: ftp: loaded support on port[0] = 21 20:29:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0xee00, r0) 20:29:00 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:00 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x2, 0xfffffffffffffffd) 20:29:00 executing program 2: 20:29:00 executing program 3: 20:29:00 executing program 4: 20:29:00 executing program 3: [ 460.949405][T27691] IPVS: ftp: loaded support on port[0] = 21 20:29:00 executing program 0: 20:29:00 executing program 2: 20:29:00 executing program 4: 20:29:00 executing program 5: 20:29:00 executing program 3: 20:29:01 executing program 5: 20:29:01 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:01 executing program 3: 20:29:01 executing program 2: 20:29:01 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0xc0045878, 0xfffffffffffffffd) 20:29:01 executing program 4: 20:29:01 executing program 5: 20:29:01 executing program 5: 20:29:01 executing program 0: 20:29:01 executing program 4: 20:29:01 executing program 2: 20:29:01 executing program 3: [ 461.824948][T27741] IPVS: ftp: loaded support on port[0] = 21 20:29:01 executing program 3: [ 462.222323][ T54] Bluetooth: hci0: command 0x0401 tx timeout 20:29:02 executing program 5: 20:29:02 executing program 0: 20:29:02 executing program 4: 20:29:02 executing program 2: 20:29:02 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:02 executing program 3: 20:29:02 executing program 2: 20:29:02 executing program 3: 20:29:02 executing program 4: 20:29:02 executing program 5: 20:29:02 executing program 0: [ 462.710671][T27786] IPVS: ftp: loaded support on port[0] = 21 20:29:02 executing program 3: 20:29:02 executing program 2: 20:29:02 executing program 4: 20:29:02 executing program 3: 20:29:02 executing program 0: 20:29:03 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:03 executing program 5: 20:29:03 executing program 0: 20:29:03 executing program 2: 20:29:03 executing program 4: 20:29:03 executing program 3: 20:29:03 executing program 0: [ 463.536125][T27835] IPVS: ftp: loaded support on port[0] = 21 20:29:03 executing program 5: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x141043, 0x0) 20:29:03 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, 0x0) 20:29:03 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20842, 0x0) 20:29:03 executing program 2: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)={0x8, 0x1ff, 0x2, 0x0, 0x0, [{{}, 0xfb}, {{r3}, 0x101}]}) 20:29:03 executing program 4: syz_mount_image$bfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000002580)=[{&(0x7f00000001c0)='<', 0x1, 0x100000000}], 0x0, 0x0) 20:29:04 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:04 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40) 20:29:04 executing program 5: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 20:29:04 executing program 3: syz_mount_image$qnx4(&(0x7f0000003a80)='qnx4\x00', &(0x7f0000003ac0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003d80)) 20:29:04 executing program 4: r0 = gettid() ptrace$setregset(0x4205, r0, 0x0, 0x0) 20:29:04 executing program 3: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x80040) 20:29:04 executing program 4: syz_mount_image$bfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000002580)=[{&(0x7f00000001c0)='<', 0x1, 0x100000000}, {&(0x7f00000002c0)="44dc53960a3ac76b8faa9b27ad702c21c52011ea959c0ef4769ffbe34411f8c6b397dc6f8d0111ad6668a18012135831f04a64360bed0d3ae96e6ce44299f032f89f652d4c8a9103a7e43f8d7ac48badb5161c214231a3d468952d19a657490c66ffa8bbfce84655d516275f9a70fec1ce2c9e5c6d5f949f0482b814934adc9ad53981264122e95b31602a452ef8a26de0fe67f4c66ea51585b9e0e864032d4f1531b038811a80152657ba16267550efb2f0921dd656f36c91f1cc9ec4fb16c0547796dbb6b86996573d879f0241e2d4d0929fee2aa08685bba5c85e9dc9abfae5a83a66f938bb6b129736676916b934e04ee3edc49aa699d05e25da47c9125749e9baa5ccb7f7c72c3048773b174664e4879c23017adcd5bb99c408659fe1d0f0b189ae4ade9e81b379b81166f9ef4055d8be74f0760fa5cee0170caaf179f2100b3211fed5d8dff6f3f13f9a72a1dd1ac78d74e9ed9b4959f01d2bbba9f96194bb7fa0e897213873da44d9bf5bc8ef164b77e6002020963355a31c3072acf877b8b45faff679f2657d1fc4d96da7cd20c4edb788115b612be38f54f7f707fa0f47494f08474b0d9b53283094e5cbda3115e0ed974c725703d021b954f82b6632689769a8ae8860a19b556344ed2bd4f2ed1d57e21d3095bf9d385080e5e62b305bbd22cfb6d5b237648784efb53bde2f5f67b537d11fe95c309034257e3131b4f48e3edef80691b987166256ade22d6d4dfdae117db78b96329605c88263c58d860fd8278ae1c8e70379aa9fcdc46b7fc3416937e401cf34c2cc0274ca385cbed6fb667662f6a55412a7b280223f6afd7a12576b336d59eaa262f00cfa85e5b96e5d97afb1592bf4f418cb9be8cabf82a5a5153cf78b97d86fbe89eab7227c86f3bb05e811cd87fed4d6b63088a49c42dcefc04cbc306361d261615eca9fa06c85f23a411a1403466a70091882a4bc112b688b81ab1cb3a2c86ccf87ddf231dad9d1dcd6dea1486d2a30bb2953b9fa93d1c404c83d4e8ce359b0e8ad2188000e73135e7acc7962f6eae266482353c629974f839074cb5a6c184ceb881d055010df98e9cfb7e646401647b7a9756ee32147116594d26498828626da5d6d6d36a40429b3667a130ec81dd29946ab5633582d753978ad109d6eaf6216734bc7aa13ba2a3aa2f34f13676b2935182dff18aaa1c4bf001cfcc6047aedee7c927a8953b81fdf0f62fb9a8a32199e07525f696c56915f128c8614c5b8fd7d6a7db8ba700b54eff3da783f1190802482daf777554468ab7bf8b69b6815e081a7a97bb4a874eded95249c26565312fcd300a7ba67fafadc27dd636df464952cb211e4387890cb5123a2e48f8ee6a12b2b50cc087d52c0d1fdf674d59e1147602dd64b31b2483074fa412fb409021e8a5655eea9c4fb2b9c6fd62ea446853ed95d4f1e620e73e757cbdc8167ad9548e0d153f83666f0cd2f36420ee91661d09cafd5dca14bb8b0ba131c320534d7e96bc889415f24c15c0cd0970fd3ab016e537e2dd6868f154f44ef4d604801f53452ccae2af6097b6f610cc2dcac44f89f4fb44a5eb30d39dfa3b807aeb54e1adc439c5ebfe8d65066315cc6ee91cc2038e1216b18ecef7b2eb8eaf3546e183e629d4b2ee8377eb2758cd3f4aaad01dd92f4efbb36b54e50aade0e719e0bae0fc861a4e713782ebbcc5921037e86c9b9431ef658e56128c591a98d800857620c2f31157dd166dd1da60849ae3abcff4c708ce34ecd52fc3857a9e3cb7e72aa74c778e9d2738e0da2087d302ba490876b647d54f6f55b2fb7356cb683d9750fb78f565b020c2f8e76fe6803e790242f1965d0bec384d20f38cda30ed78b7c14471cfaef68cf6f7210bd78f762a9165fe5c0968c518950d33720d7d849fa06bd8e67b776d1f3001ede99e0b9bba8cd604de1bc6fd1ff3ad6a1643f19f3081dc38baf49c5232d80fb1f9e74751da0303c75f53ab10a9564edff04cdab70d5b6af9fb97f8c779f701a65b5a666fa91c31d7a55d5e812d9fbf1a8ed177f230811192b13ab22eed3e1571310abfb0a38a2859bfe44f31e7067304e9adcbc1c9d08b9e2584b7156c152b8ba24a3361395cd105f8999aecd374272310d9ae2c2ee4b4d7f71f266dbc5229765e4d3a19a67e6888bf56f2165871b02fb8f9da2cc52fbe49967387dfcb05c5529935d4a19f0cdd9a5e44268403a84c05ac8210ae7771f0bd14590208acc0224d00acb9a82ad298d5ca84ad13b9982b7a384b8ba2717b3197e6f16eb7bfb4e4bffd38fad07ee408bfb68c50794340274053664bd3b225562a92eb3106708662ba4d19a8228dd1f7f93275e1ea2c57938abdab290a723d40825e0bec3f36ab926490cd465bb4481b81df238ac63fe2e8669a9a5f4c74292b852cc22841309e276610af9d95ccf4c0ab97bc8f680a2e11b36b6c9b2aac087bc61df9aa3b30746b8977ff7a2aaad6a29f2c479b78a42b1cee6730e978b81ae0c72fdd5c89604b5f4e7bde18e8c70f029e07460ad9d9114734244f3443fa515f551ec9a5635ddb6d6cf55b1a121531bb527b85e90635ed922e7d320de537153d908d6f9bf3aa618a2666211d045a4766b7b5e28deedddc93a7c79ee9618f5579d55d4921d44c9a724c021b5e35fb89e1e7dfbc40de1d72a05816b8a13867cfdf71b52c4c713c4c378726d394b4d5f526fc779ec76953a189ff847df720da5f1679c8e17c7ee113889f623d1153abe82b9c9bc6d104d433ef14620e41e5fc1010f1fd4680aa0641c0c1f4963609c94a3e09a0f3cf3844de084dba124ede27a93d8b90240ec23009d00b9ab2be653dbfcfcb29c90a43818f446bc652b6878615d09e37151f056fa5d16838dd909284e9f296248e6e8a192f65ee1fe3d04979d891b3c8c964f817fe82884ed40fd7de12ab1f395e0b9c69d0e0571ab11cd3e2a0dfd0d732ab452b51693478b0934742182b263a184c6f77c1849b00045d4be90f1f6dc6dc503a410752e1f4f1a88fdff7ee293c4f6f7a460cca2b45ec382355b9c3886b679c1bd3e2c5499deb6a4045456a2db5dbb040198841d41947820c36c6a23b558997743975fe8a9c3e2621f36324e0fe65f526071c9db0daedef92cedd70028dfa8e80b9c8e3dc5d6ceeb0d9f4dfd78e4dbfd3ea2d8224384069e83f2f64c0e4d1fa4fbea78845675234cca02f926ff1821e2b19d3949da6c3cd30927e322dc7060840ef13f3e5291cae7acf9197bfb1b1eb4ef8481c6c02982a04cbb07f2f684cdf9f183095868dbd89ad4e3a74396048217f2629a1fde4da0eabd049e8c918e3894c00d55a685694ebb7ba85300c1862bb4f70483fd06562394b6222df4af386a1bcbac70ff07918fd144aeb9d26a3d1b6294b984b77212945a2d13f4cfce2d1a2cd55a379bf865ffe5d55010c4f0e546dc1f97601427b9bc0915572d5e79d51df5ab193beb805364bdc539d8e582dd3787540cd2db61975afb5776d48822a103a31b08968afcc2913db2cb0c55fceded89bf35a20fa84fe954680a9768503cacefc1011b4b907dd054fed562bec5fbc4b4de138971cc35e831f1bc6995b416df10f4e9262f6cac8176918ce1acde4980adc74ce2855f37b02aa9ad09384f6425be190c91a01023891e34ef9ba10132785146d208e5f98dc8bb1467bb6146d7f0a618906353ca0a34f3c5ba005028213271acb554120bb0d1c61dd8b13771127781af541b078be05f4be3554b903d96210baec20b52fe4596266fcecaf65e018d9de27de108a4b210113b58c4e865afe6e1c9e35fa84709333d0fe34e1d381a999991362aa79f31ed312a970a9100fd9b1471c363ebebc527234eb630b55347e1db98c93bf12a7c2058fad659684c1999a803e8ab4ae8c044c6984e03930b75aeabc7ec893bee5ff3eea8bead73c60b40ae88461f5cdf089e93c168f917165f72084b3efc3335af980767240a797b14694081bec534dd4aa6ae64698d0a8c87328c4a5689a85c2d23bdc9f6ab811d2b616461f22ed52516c20c112b3ca9ef20d7743cbf575e5a1dd992bd0d8ebb7a67b9a24352d93ec006dd3d1aa9dcddc188a54162ebf3a7a4d6987dbf3653ad528fc76706301bdc300d81ab07ea4842140a8f138fb81a732dd6df6a09171161fae1197f007c9cbf56449dcd16dae555769d43a7ef1f8ae41195c5aee663e30fa363cf919e143330fec2c6a353588cbaca6a1967c1e2c36b7c7b976cd208889af26faa76951c81ad04bed64e6befa5289567456e023a83a3b0e7a51a17a813f4785251cd422800b1f5ab680945d61d2648e400ebc7c331a0b044c663cd9a4e7bf44de6c7141e195dcb8faaf07e3cac2c1a7fb885481748c2f76f88587971bf8af77910f1c1ed6632f746828bc8605ffbbec91b23667c3ebe52f56bc0e273e901a4b3d5b687c6302394424ecb4e27a243d25a78ae8b6a8246eb417c6fcafc56bb2742366d8e457152de5400412bc96fa311784ee17397d12b00b92cb69ba28b49758d5cd5e5979d1401f692f4d2c5785738eb87321064d066c98a386288172b0d77a90eef5c43329595e25be287989a55221be57ee5b91bbf105d0ea9f99fe8ca50eb75c829cc34c1b113a1063a9cfee79c7f0d8cf37624256014d012a630d80ad77c490f5162e3cbace325b4fe65c64b0e11ece3046cd09fe2e2dc92a14f681d24e3f872af2baf1c66d8671419fd4fa2c3d6297e904f1044daebe7a5c6d7a4f946b328bb6df36231823c3520a77c04cbffa525d8de4a285492eb342b4a75d42607fe77a46986d91dc7f0892d29db8a006117bb21f483f965d22c4ab6f059a01e573b9af96c519f5f9191efe1d95806e24259ce81c318edce800212ca38d74b8dcf73ddafd4a16df642c2c63ee1d74c7a6a4c0198953cf5f831da894f016080f2bff28dcb84e9a2906da7c8520b65f4ed961deb71db4fead66c2d601b18da45ede5ea82ebae00964bcd9109159441e1fdd5dffe048043406298917dab1d4cfef9c8b6ff0d098f367b6afde2e6ed8c864fa81a23382edb47f56071920b18e27569afdea38af8379dce62a9862feb2e0932883e4bb95473972c98fd44391da29842126e4cbe9b11fd1403b13a53946b003a618b222bf6f096131927574dc9ba707c1d51736700defc1dfffaf47a01679b1c0a08ea3f679b2689618d5357c778577f4e48ded03f0ee1c5f47d1cc9f29d86bb9e0fc0e311b51397ce19ea695298e2fd5c534b906e294be514028eda2b97d20957eb97442c1260bfecad83a9b1cbd9f12e3f02895ec560893b80a6d776a4a3524c38a01935062f8dd1e917934e61201c30cd8b7ab74ca2c92b6c6e8be4877e576634cbf5837f2b9605fa47a4b81f8b568a31b5e49c1e5741582a854f7096a436e44fe80f71d9f60005a2606afe189afef8b70a7f7c6171dcd8bc5319a4b2379885955c884414f7ae2b705380cfd3f8591efd0674858835483f39037fd61b8935c11ffb3f35c0375e29d4c4e0836c76d7b6aa9a738ddabb42f63edc56b38f067f8e0a3477d3d07edf00db8d95c96a85bf00027a9a6b17b88c62c9a26d55161b1b5577c76f204f53bcb1dc22e2a19797cc6fc6cb2dd674e695d4043a91e65664e2a3812c29db967dddd0492dd84fffbeda07cf8f01ca063028b076daac843ccc3a08e961f70d582a33b68536973117c2fb8de7310d6ad566c11fc1cbf0eb55446375fe4e4e92a51b22cb3d37a76330154eca43e4a097f0766e58cc38297c049af5a38bc94a219116891ce17a87b0f188", 0xff8, 0x9}, {&(0x7f00000012c0)="05", 0x1}], 0x0, 0x0) 20:29:04 executing program 0: ustat(0x1, 0x0) 20:29:04 executing program 5: [ 464.410278][T27898] IPVS: ftp: loaded support on port[0] = 21 20:29:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000080)=""/16, 0x1}) 20:29:04 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, 0x0) 20:29:04 executing program 0: socket(0x22, 0x0, 0xa5e6) 20:29:05 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:05 executing program 3: mbind(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x8000, 0x0, 0x0, 0x0) 20:29:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x2}) 20:29:05 executing program 2: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002580)='/dev/nvme-fabrics\x00', 0x303c40, 0x0) fcntl$getownex(r0, 0x10, 0x0) 20:29:05 executing program 0: openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x200) 20:29:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), 0x19) 20:29:05 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x204103, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) listen(r2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100030c10000000000000000000", 0x58}], 0x1) 20:29:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="50000000100005070a00000002da6e0600000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010062726964676500190c00028008001500000000000a00010000", @ANYRES32], 0x50}}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:29:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @private1}, 0x80) [ 465.266596][T27957] IPVS: ftp: loaded support on port[0] = 21 20:29:05 executing program 5: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x80040) 20:29:05 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_FM_LOAD_INSTR(r0, 0x40285107) 20:29:05 executing program 0: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0xe034, 0x0) [ 465.406960][T27989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:06 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:06 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000180)) 20:29:06 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_FM_LOAD_INSTR(r0, 0x40285107) 20:29:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xffffffffffffff66}}, 0x0) 20:29:06 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}}) 20:29:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0xffffffffffffff82}}, 0x0) 20:29:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000780)={0x14, 0x0, 0x301}, 0x14}}, 0x0) [ 466.129821][T28020] IPVS: ftp: loaded support on port[0] = 21 20:29:06 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') 20:29:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000007280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 20:29:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYRES32], 0x14}}, 0x0) 20:29:06 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 20:29:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x200, 0x0, 0x200, 0xffffffff, 0xffffffff, 0x318, 0x318, 0x318, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "717413623ee25689e8f64ca281b66202ebe609d76846287b672f55fe9d95"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@ipv6={@loopback, @empty, [], [], 'lo\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 20:29:06 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0xe}}, 0x0) 20:29:06 executing program 2: syz_mount_image$ubifs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x2) 20:29:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) 20:29:06 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000200)) 20:29:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@check_int_print_mask={'check_int_print_mask', 0x3d, 0xfe00000000000000}}, {@device={'device', 0x3d, './file0'}}]}) 20:29:06 executing program 2: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)='K', 0x1}], 0x0, 0x0) 20:29:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x594}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x3f}]}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x4}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x48}}, 0x0) 20:29:06 executing program 0: openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) 20:29:06 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f0000006680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 467.021399][T28083] IPVS: ftp: loaded support on port[0] = 21 20:29:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x0, 0x2840c0) 20:29:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@private0, @private0, @private2}) 20:29:07 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:07 executing program 0: syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x100000000}, {&(0x7f0000002440)="a9", 0x1}], 0x0, &(0x7f0000002640)) 20:29:07 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000003740)={'ip_vti0\x00', 0x0}) 20:29:07 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) 20:29:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, 0x0) 20:29:07 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x123000, 0x0) 20:29:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 20:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000300000005"], 0x1c}}, 0x0) [ 467.855816][T28146] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=000000a9) 20:29:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) [ 467.909716][T28149] IPVS: ftp: loaded support on port[0] = 21 20:29:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01"], 0x1c}}, 0x0) 20:29:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) [ 468.005736][T28146] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=000000a9) 20:29:07 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={0x0, @vsock={0x28, 0x0, 0x0, @hyper}, @sco={0x1f, @fixed}, @generic={0x0, "7240df301c32b009d6bb6d6f0d22"}}) [ 468.047708][T28189] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 468.060721][T28190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:08 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:08 executing program 2: syz_mount_image$befs(&(0x7f0000000200)='befs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2049016, &(0x7f0000000780)=ANY=[]) 20:29:08 executing program 0: syz_open_dev$dri(&(0x7f0000001a00)='/dev/dri/card#\x00', 0x0, 0x191941) 20:29:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000007280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r2}}, 0x30) 20:29:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 20:29:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003700)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16, @ANYBLOB='!'], 0x48}}, 0x0) 20:29:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:29:08 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, 0x0) 20:29:08 executing program 5: syz_mount_image$ubifs(&(0x7f0000000180)='ubifs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)='K', 0x1}], 0x0, &(0x7f0000000480)) [ 468.713635][T28211] IPVS: ftp: loaded support on port[0] = 21 20:29:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@ipv4={[], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, 0x0, 0x0, 0x9}) 20:29:08 executing program 3: syz_mount_image$ubifs(&(0x7f0000000180)='ubifs\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)}, {&(0x7f0000000300), 0x0, 0xffffffffffffffff}, {&(0x7f0000000340)="4ba17ed72863cafbd215ffa5cfcac3c64ca2bcab97d047075aa11d4c039f9ee8ef9a872eba0f61801c599e3387d6", 0x2e, 0x8}], 0x910007, &(0x7f0000000480)={[{@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}], [{@seclabel='seclabel'}]}) 20:29:08 executing program 2: lstat(&(0x7f0000000000)='./file0\x00', 0x0) 20:29:09 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @vsock={0x28, 0x0, 0x0, @local}, @phonet, @can, 0xb349}) 20:29:09 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x7}, 0x4) 20:29:09 executing program 4: r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000280)) 20:29:09 executing program 5: remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 20:29:09 executing program 3: syz_mount_image$ubifs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 20:29:09 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000e40)='/dev/input/mouse#\x00', 0x204, 0x101641) write$sequencer(r0, 0x0, 0x0) [ 469.574747][T28283] IPVS: ftp: loaded support on port[0] = 21 [ 469.578676][T28282] mmap: syz-executor.5 (28282) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 20:29:09 executing program 4: socket(0x15, 0x5, 0xfff) 20:29:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{&(0x7f0000000940)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0, 0x0, &(0x7f0000000a00)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 20:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60, 0x0) 20:29:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:29:09 executing program 0: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000003600), 0x0, 0x0) 20:29:10 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f000000b980)=[{{0x0, 0x0, &(0x7f00000056c0)=[{&(0x7f0000000000)=""/40, 0x28}], 0x1}}, {{0x0, 0x0, &(0x7f0000009f80)=[{0x0}, {&(0x7f0000007d40)=""/229, 0xe5}], 0x2}}], 0x2, 0x10106, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000011c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) 20:29:10 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0x80045105, &(0x7f00000001c0)) 20:29:10 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000035c0)='/dev/input/mice\x00', 0x288000) mmap$snddsp_status(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x82000000) 20:29:10 executing program 0: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @remote, @local}}) 20:29:10 executing program 5: ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) 20:29:10 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) open$dir(&(0x7f0000001e40)='./file0\x00', 0x0, 0x0) 20:29:10 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) 20:29:10 executing program 0: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000c40)={'gre0\x00', 0x0}) 20:29:10 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 470.483856][T28344] IPVS: ftp: loaded support on port[0] = 21 20:29:10 executing program 3: 20:29:10 executing program 2: 20:29:11 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:11 executing program 4: 20:29:11 executing program 5: 20:29:11 executing program 0: 20:29:11 executing program 3: 20:29:11 executing program 2: 20:29:11 executing program 2: 20:29:11 executing program 3: [ 471.331204][T28397] IPVS: ftp: loaded support on port[0] = 21 20:29:11 executing program 0: 20:29:11 executing program 5: 20:29:11 executing program 4: 20:29:11 executing program 3: 20:29:12 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:12 executing program 5: 20:29:12 executing program 4: 20:29:12 executing program 2: 20:29:12 executing program 0: 20:29:12 executing program 3: 20:29:12 executing program 0: 20:29:12 executing program 3: 20:29:12 executing program 2: 20:29:12 executing program 5: 20:29:12 executing program 4: [ 472.205289][T28447] IPVS: ftp: loaded support on port[0] = 21 20:29:12 executing program 0: 20:29:12 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:12 executing program 5: 20:29:12 executing program 2: 20:29:12 executing program 4: 20:29:12 executing program 3: 20:29:12 executing program 0: 20:29:13 executing program 4: 20:29:13 executing program 2: 20:29:13 executing program 5: 20:29:13 executing program 0: 20:29:13 executing program 3: [ 473.074058][T28497] IPVS: ftp: loaded support on port[0] = 21 20:29:13 executing program 5: 20:29:13 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:13 executing program 2: 20:29:13 executing program 4: 20:29:13 executing program 3: 20:29:13 executing program 0: 20:29:13 executing program 5: 20:29:13 executing program 4: 20:29:13 executing program 0: 20:29:13 executing program 3: 20:29:13 executing program 5: [ 473.954578][T28547] IPVS: ftp: loaded support on port[0] = 21 20:29:13 executing program 2: 20:29:13 executing program 4: 20:29:14 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:14 executing program 0: 20:29:14 executing program 5: 20:29:14 executing program 3: 20:29:14 executing program 2: 20:29:14 executing program 4: 20:29:14 executing program 3: 20:29:14 executing program 2: 20:29:14 executing program 5: [ 474.839314][T28595] IPVS: ftp: loaded support on port[0] = 21 20:29:14 executing program 0: 20:29:14 executing program 4: 20:29:14 executing program 2: 20:29:15 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:15 executing program 5: 20:29:15 executing program 3: 20:29:15 executing program 0: 20:29:15 executing program 4: 20:29:15 executing program 2: 20:29:15 executing program 3: 20:29:15 executing program 4: 20:29:15 executing program 5: 20:29:15 executing program 0: 20:29:15 executing program 2: [ 475.716498][T28643] IPVS: ftp: loaded support on port[0] = 21 20:29:15 executing program 3: 20:29:16 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:16 executing program 2: 20:29:16 executing program 4: 20:29:16 executing program 5: 20:29:16 executing program 0: 20:29:16 executing program 3: 20:29:16 executing program 2: 20:29:16 executing program 0: 20:29:16 executing program 4: 20:29:16 executing program 3: 20:29:16 executing program 5: [ 476.615340][T28691] IPVS: ftp: loaded support on port[0] = 21 20:29:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000a80)={0x2, &(0x7f0000000a40)=[{}, {0x6}]}) [ 476.829533][ T34] audit: type=1326 audit(1605126556.736:14): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28708 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 20:29:17 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:17 executing program 0: prctl$PR_SET_DUMPABLE(0x1c, 0x0) 20:29:17 executing program 4: rt_sigtimedwait(&(0x7f00000001c0), 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 20:29:17 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 20:29:17 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:29:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x40045431, 0x0) 20:29:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x5452, &(0x7f0000000080)) 20:29:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x2001, 0x0) 20:29:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="10"]}) [ 477.524337][T28743] IPVS: ftp: loaded support on port[0] = 21 20:29:17 executing program 2: select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x5}, 0x0, 0x0) [ 477.576072][ T34] audit: type=1326 audit(1605126557.486:15): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28708 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 20:29:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) accept4(r0, 0x0, 0x0, 0x0) 20:29:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:18 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000005c0)) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000005c0)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x3b) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, 0x0) accept$alg(r4, 0x0, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000080)) r5 = semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(r5, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000580)={0x0, @xdp, @qipcrtr, @xdp={0x2c, 0x0, 0x0, 0x21}}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@generic={0x3, 0xfffffffffffffff8, 0x9}) semctl$SEM_INFO(r5, 0x3, 0x13, &(0x7f00000000c0)=""/183) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'syz_tun\x00', {}, 0x9}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8921, 0x0) 20:29:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8915, &(0x7f0000000040)) 20:29:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002340)={&(0x7f0000002300)=ANY=[], 0x34}}, 0x0) 20:29:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xf6, &(0x7f0000000200)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x0, 0x2710}}, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:18 executing program 0: prctl$PR_SET_DUMPABLE(0x7, 0x0) 20:29:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) [ 478.421031][T28804] IPVS: ftp: loaded support on port[0] = 21 20:29:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 20:29:18 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0) 20:29:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0xe600, &(0x7f0000000040)=@framed={{}, [@ldst]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:19 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:19 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, 0x0) 20:29:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, 0x0, 0x0) 20:29:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x15, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}}, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000051c0)={0x0, 0x3938700}) 20:29:19 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000001c0)=0x17, 0x4) 20:29:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xae}, 0x40) [ 479.314317][T28866] IPVS: ftp: loaded support on port[0] = 21 20:29:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@ldst={0x2}, @call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, 0x0}, 0x78) 20:29:19 executing program 5: socketpair(0x0, 0xb, 0x0, &(0x7f0000000000)) 20:29:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8921, &(0x7f0000000180)={'erspan0\x00', 0x0}) 20:29:20 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:20 executing program 2: ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000200)={0x0, 0x0, 0x9}) socket$vsock_stream(0x28, 0x1, 0x0) syz_io_uring_setup(0x869, &(0x7f0000000000)={0x0, 0x3cd8, 0x8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 20:29:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f000000be80)=[{{&(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "546756f783262924e645552ca6eae7d18310654bacab9c3d6a6590e4bd188d707570aa79a1ecabcce3ab6ca0e7cd6b18921d2e1c3e0032b2817a31ff5acbb7"}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)='c', 0x1}], 0x1}}], 0x1, 0x24008080) 20:29:20 executing program 3: syz_io_uring_setup(0x5cff, &(0x7f0000000000), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 20:29:20 executing program 5: rt_sigtimedwait(&(0x7f0000000180), 0x0, &(0x7f0000000240), 0x8) 20:29:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x5}, {}, {}, {}, {}]}) 20:29:20 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 480.167219][T28925] IPVS: ftp: loaded support on port[0] = 21 20:29:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x12, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:20 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002940)='/dev/full\x00', 0x0, 0x0) connect$netlink(r0, 0x0, 0x0) 20:29:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000001580)={0x0, 'bridge_slave_1\x00'}) 20:29:20 executing program 3: clone(0x100000, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000300)='1') 20:29:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0) 20:29:20 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r3], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000000000095000000000088be8f45ee81b0f129d39cd3873f79000d6cf45ca34a4e7eaac3b86d3fe730ac7ab8b6bd5acb1c994afe832e327a628593b0499fdbac80a2f51bbedb3be5b62664dc9d7c8228d7ba28905d94fde20400000041c9c182c17943ea88d3305e873a3821916576c75bdc4e22e76435e490ca54cfb677e6c4e3ee1200000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xba) 20:29:20 executing program 5: sendmsg$alg(0xffffffffffffffff, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="e614459651ca4323d74dc46f1a47", 0xe}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:20 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg1\x00'}) 20:29:20 executing program 4: syz_io_uring_setup(0x2531, &(0x7f00000000c0)={0x0, 0xa073, 0x8}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 20:29:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x541b, 0x0) 20:29:21 executing program 3: prctl$PR_SET_DUMPABLE(0x21, 0x0) 20:29:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "71b327a9d777416ca6c598e97391bb3d6b58f1"}) 20:29:21 executing program 0: syz_io_uring_setup(0x1373, &(0x7f0000000000)={0x0, 0x0, 0x20}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 481.061629][T29000] IPVS: ftp: loaded support on port[0] = 21 20:29:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x6, 0x5, &(0x7f0000000000)="82960a8a", 0x4) 20:29:21 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 20:29:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x5}]}) 20:29:21 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:21 executing program 0: getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000080)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) 20:29:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000080)=@ethtool_gfeatures}) 20:29:21 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x513d01, 0x0) 20:29:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:21 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x901, 0x0) 20:29:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1}, 0x40) 20:29:21 executing program 3: setrlimit(0x6, &(0x7f0000000100)={0x0, 0x40006}) 20:29:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000019680)) 20:29:21 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1d, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 481.968552][T29067] IPVS: ftp: loaded support on port[0] = 21 20:29:21 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0xc1) 20:29:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"8a202937ab50cea2e1c86b35c34ac443", r1, 0x0, {0x90, 0x5b0d}, {0x97c, 0x100}, 0x40, [0xaf, 0x9, 0x6, 0x3f, 0xb, 0x2, 0xd8cf, 0x4, 0x9, 0x7, 0xffffffff, 0x5e, 0x5, 0x7, 0x80000001]}) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000180)={0x0, 'macvlan0\x00', {}, 0x81}) 20:29:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x80045438, &(0x7f0000000080)) 20:29:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001940)={0x13}, 0x40) 20:29:22 executing program 4: clone(0x40000, 0x0, 0x0, 0x0, 0x0) 20:29:22 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, "263e270e1a4a78823f4bc6db2fc01f06ac2833"}) 20:29:22 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:22 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 20:29:22 executing program 2: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x101}, &(0x7f00000000c0)={0x77359400}) [ 482.870914][T29129] IPVS: ftp: loaded support on port[0] = 21 20:29:22 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, "263e270e1a4a78823f4bc6db2fc01f06ac2833"}) 20:29:22 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000051c0)={0x0, 0x3938700}) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000240)) 20:29:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8936, 0x0) 20:29:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:23 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:23 executing program 2: getresgid(&(0x7f0000003fc0), &(0x7f0000004000), 0x0) 20:29:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x9, 0x0, 0x0, 0x0, 0x600, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x40) 20:29:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001240)={0x0, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, @phonet, @sco={0x1f, @fixed}}) 20:29:23 executing program 2: select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x5}, 0x0, &(0x7f0000000240)) 20:29:23 executing program 5: select(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0x3}, &(0x7f0000000240)) 20:29:23 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000002940)='/dev/full\x00', 0x101040, 0x0) 20:29:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:23 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:29:23 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003880)) 20:29:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x80045440, &(0x7f0000000080)) 20:29:23 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xa1a}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x8]}, 0x8}) 20:29:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) 20:29:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x284040, 0x0) write$tun(r0, 0x0, 0x0) [ 483.753550][T29198] IPVS: ftp: loaded support on port[0] = 21 20:29:23 executing program 3: prctl$PR_SET_DUMPABLE(0x17, 0x0) 20:29:23 executing program 5: prctl$PR_SET_DUMPABLE(0x16, 0x0) 20:29:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) 20:29:23 executing program 4: select(0x40, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)) 20:29:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002340)={&(0x7f0000002300)=ANY=[@ANYBLOB='4E'], 0x34}}, 0x0) 20:29:24 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'veth1_to_batadv\x00', @ifru_names}}) 20:29:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000040)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 20:29:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@qipcrtr, &(0x7f0000000080)=0x80) sendmsg$alg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="c50f3ea26d6188e18a5d0ebc65e457de7c2af9c4e5d475a66b2d1d4e69d3f8f1029f55332ca7248591de333913d0fa5a70305b10ba2e1d265fe60afbf832b1b293e2eeced53317bb2b4b75bf7dab39112840e10cfc3184e098b509be41a4442d5fbec0e684e63e4b540420177d8ede342f466a5bac3026b74b670c8bf8e564f66adc8223b27753b3b89caf52d015e5d32ead37135011ac33b3bea5b9be7155f8de5b3cc0f45e25f791868ffb8e163520be0468f05b355166dd867762ce0823b27d7d6c73e3929029665f00abdb18cc93008d780d0252268d228c35f359bfd0afb1c1b8472cbe578d1a8da7494c06e90931d07690486824bdac4dabd59f343ff926378a1da1d7094d0a81eed790dfe22c60655c3e10434b2b83da54008686a004fa56ae010eb4e9b740c5248300d200753b658a727f555637e353edf26a126180c971ce97a3d1405b8417727df3ca8f8389b443e49e53cde01440e364793e8475df3870963aa25efc9ea933a5905fea823e8f021dee9022a259f29d8db4ddb99384deb1067914f8d7d9a234b96ced19508353a344383b14190664ae36f5e5e5188fdf4ab240a8ec0d7070976501679f3244280c499fedfca802db27ca0f342bd1c9c921b819aa90d2910c6492d7e1ebf36cf198d334dc04f91a344decdc52882a01d162439a85ebe855af3323bf2f4e8f11c6ebf251cbc57ac2f5f2998d3214ee20b177e64632fe4d44af6c88b3ec0f3947a4d64b0da77e4cea6ae0cf5c0905f7d8d4f3c060e3fb8fc9dc93c94756c9c305ec359d1cd151361a20055ec51b38ccdaf97f039d1b0ed492c126f77eb68909a5f2d28bfbc0756e05db0efd1ea3845492c856b0462634573e22fc4948d01c019fd9fd566aaf49c92abcf79d788851ec2293c32fc41215b3808d2cb15dae372ac4dfee6c34963b58bee39d2deb1d9fad327222787850f640657c242be22ef60d5970eb47e4c48884c2792ed90a4694fef0050e9030de3951ad22f3a559ee685b173424cee94062db399e975d773cd856d0ef144a4b888fbc95ca871d02c225b6d738e4b35547b89fa6fb68f19515282deb4d87e05076c3560052f181b0c252d2f389a1d31b9899dcd4bc123b90d79f8db7b417b9de9ed1e4abea15bce8299c068550e2f61387711e1cfed0ec8817057b85bd33615b745e6bc4c2695164af256a9c5089c76bc2d9bb213e97c62cbdafb041300f7363040e80eff4b39edc01cfe4b9ef0667f49251b832922383cfe9d517574eda0c0a53678a8f4e3ff86f79fe8c52ac0643841b49f9066e7f97c3bf2f019b9277913d75f2bf70316191f77aa129627556c0cb46310b8048e19e6a67a4d646c90625ea42c1262ef61fbf39f4c9d38ef322fd20528092444aafa8831381ed39c93a9de2e1183b7d6e57044a918c5caa73344d865fa1962144017c02e7dab49621eb245b4154280f3e606a5834486d55f79726cd4d1fc532281c00b5db931c9b1541bb7eac6a2be8384fe91d7cca0c7e4f874c95e297ec19f8d7f20f70539ed7e8947d7bfe6fc6cd4f22901cd7a6164270af852d20ee2060b75bf783799e461b1337cff96a0f1e6a8ec64bb23bf7f754177c1c1be250f8ead0c410a8e2f9a7b9adaf674af0211b94c65b6ad998adda038debf7dd5c8a82ab94ad0514a846d985d1b0a45e92f0dcba2d65fe4d4dc8d5f36e1e7252b3e3f79b7e2e7f347bcf34f1b9269de7009e6f2d7d91296e876843af431f71d5340bebe3259498488be1eb675122e6103606011f71fc0d57ba3d45cd27366e331d3ad61e1b9b4321ea3fbececcecac9d7d9f07134570e3abf9f534258169cfe9e4c617a23e186ab0ec3339726488c804069fcce826ce75ef1e36ab50c0e32afbe087a4c98096c725f6d29bfb939ad2d4259f2db6a116d9b435272ad6bc9be9c4349e15c13640b7a545049164c95100fbf077ef7352380bb9d64b91cfbde753689347e4db7cc9562252c8aeab6bd05abbedc6fbe3008dac3944e87ef89ca4c3eebc0e3e1965b2e481df14329837ef476b3bc74f4415e612b53912e22a0e981b66384e111a51f392bbfdfd090503e282766033d2eb4e1c0b8004608823f8201a2f39b8d10250006113449ebf928a4f2ac53dbe9b3a231d0311471733976e94a602592f0d6f9f08bfcc87bcd9d844b974e325ddaa077fac92bdc213a234258cb8f3ce882050f4e4da4a4fd03bfd2ba75312ab0bf50ec2fe515f79c0c12c9462a81a8599e31797ce5189700c6f758a5dc60c131b05122184e059b2527c0e2fe0203276bcc071b71e18c18feabd4cc2e1f72b195dad5422a098ebeeb25a89fcf01e4d1ab6aa188f53eee74df2e7a7117865ffd2be2f1c2a66e7d3ed5e47fe32b8663c52d9e0f4baf39d1c8ce3bf668d1920c15d82dc8d3cf5cfbb28f556a347bc1c68595c2806a00c6a8b537f2ef661de92867656b9a0e09ca6cdb3f551218120fe64c7591ea3b05ec4ed79ac1a36d25f6b0a51544d975dbad9fac01fa24c7e812c864fbf692fe82831ac57209d054712f339f236ea3ad59e560c955cb048f6b70b27c61d782836ffe10e8cf6055b5ac274b8913eb69de21e5261b2937f7e1c9d7d871e96ee1aa25a46dd416527134e7b72df2187b95513a5250cc6b6d997abf991e346ea3921ae64a6ca98712149fbdc7e9ed27dcf06e29bc912b6c40f3eb592cadbf23100ec6c8d51851f2725bf11c4f425ece79ed0e605420c1df843a78a3b7445877788b0b2f18bdda5885ada99058c8cdc808f820a94a8d243b6b97b0276de5460734412cdf39b14c0ba5a1ff448b70ddf49cf7a3eacc641d7e54febddb44625cd5a31356a37bff99662a0bdf1dcdbeb2bc33c1f315c9809d6f8a4b6da964d27198f6eb24a423cb80ef3b7d93cc5ec684e9e037e16fadd6bbe3a4aac9d63792b8704503c2e675a540a9f62b32a792e6b5b9909c7454180e56f1519fe7c75f2ad716340069d43329700722509ce4762ba45b9d11138a66b8df475fc96a7f57dcc0f2ef6585dd371adc8a08e1e501fddb7c0f0f1b9cd412269de3aa547d6b3cf4d26f2cdc4eabce518e2f2c13be609a475e7e73fc2eabeedcb45e153b921badf7abed0fe369e378eb2198d6ecd05504888608c8aa935934a3d30229789bbba3702489cf247a0235538bc00037c5cf9a2f8b20ec767b366df89c71a43560f1395d2c389615fce2c931334be8c606442b319e4fd775c9b510aac58de60d27558192ec40cb7f712ce7924ec955f31d0fa58abaaf51caaa81afd65ae6496ff95582e46c476a5a38a808631ebed30ab8a2feaef8141a431d9d4350d495bc0e4d328ddf5c47a3db926092ef991894cec5ee7804301befa9ec1773df2b6a2bea38bfacdb17aafe9b93a6a52c3ae927a44a89b2e7002fa69ccf6b4e0060979e885d65b47a3d4391927b8ae4faf60e39500094a6c618bdd90afe33d1e98ac6271ded86391c30cd502e11c319b2f306df4a235949a0001782512dbc4445569f22519c796348f729aae380ddb5de3ae516b92653a580a8018a3d4e269350cfccb3fb90e27d59429b2fa33f405ebfeb0ecda551a043882b9615a48651039b10c7766179cd8883a906cad2a4d272fb035b2b8fad801e4f5ae538ec28bbaa0bcdba61161a8ae4fb81eee08e99d442ebd1f09848b474d650e9094f1e44f51c15d163ad90d5fd155b74ab3760e6898cdcc6fe919b1c0ae1309b901996f15be1304f2363f2683ac0f99d26f7145e0fe304ce66e7cfa6977621b507d2dffb418d511fdf83e18a822c6b674533697345008eaa66c2c13fe04c7a33dde005e683894bec47ae11275fcf7ddc4cbe32ef315d41f0ad16c3f253a1ed77cdee73a8888bf90a42d039c97b360aa2ff8d083e54d710df6f7117539a44df48064537b792f453b1d5499414634877ffc4edd8d91c88218ffbd0626c2b39dbd7c6874e5f2e2d031df04a6fc0ff97ff753b897f980f3c3523f7a456b67e560e8c71a15e3bd98655fd3cc3b74b410042d92a19b2ee5e1f25dbddf236e5b4aa601c6e556bb507dcef6d8635f939edd202998f2f3bf11e365f51ca39b3d5013eb39b5c10f1260734526aad0bc8f0adadcd81570f8ab3d8ee3009a51681021db57b98fee191a5fdd63dfb07d6d125397be2792f621b8803a49c1fe2ea4c948921248f71884106c6a5e52466651003cdbfa8c1d7b97266897322548106740f9f53ff99cbf69a5a631088bc1c975f739f2ec9886669721a5da4c6d221f71ac37c62362a498c4c738c5537b86de7ce8d18147222e9a8c0c2ac9dea51fb354a28cb296135c8dfec0cbaf602e7a709cde895376aa937e4a91178d11019ed4a6db90a9fa806f79ca73bdc4492c4564940c029b74d383755323be1b7b14b13f5ea0ae0d1a844535757e981beeee29fd98319631dfcfb3c0194bc03b7c7fe2b2b87a98d760da8af23a58d04a94716c83ba3716d84e7ca562eb5d3a8f247ad863ca9490eecf8b2ca3338466de4bbfa6acb310bf709376a897d8b75f8d9a82e93408b45fb9a54ebb83da7109419860fbd73c049a9d4a5cfb6e27eca93a36cd3b5f1811ae4fe4b38db6eaade57c9c245c8837eaec098f11690e044aa3d77deef93dc4de6f9c0e3c16b4664b3a7bec4a66603719cffd7d97b5db30f91840b0f9e8b2f27aec992485002ef8f445be87a31f01c5ca9e83905adf40bbf1d5a0ce6b00e6afc119a72bf3887ab8d21ad61db62ea2703d8ef054297840fdb0c02fd13f2357daceb04f90f537d7f1cc53045799694a80a4d5368c17d322c306471b34edac2f235ae534ee5b3828a60b2d906d5c8388afc87417cfb39222ebba4c939dd3ecb1ee221c76c11596bb45a9f59feff74713d87fa5951b612cc7d21965583c099eca1b0e5b6671595cff5229352d8473e648c8a79180e23e40af43eb546e37b50497158c1786d7ff1d0b818760ee60e19ef8ee22eb8b28fa248662283bc87c3676c49858c543c31f008228632706b62e6b664f17762dc3a033376ce686833cea780b2980ace14574b03aeb9c637792f66039b32e56e72541009755618c77e4d0b48741bfc0de7d2c1949e56123dd2b903475dee9b40540b1591f9c5dad664440d5a04fa703b253f8c23d08357614ab571ea03fac4ff872be8fc3e41c9532a9774dbded0c576b4ae9a4d1e28eb6a74aae5d480eadae5cde81d982babd993e920c3029643f726e973e2d5d95a97f95bfe33881bdf0be914a458be9de04c571b4a136a6b4878cbf1a6196a1466b355347650636fbb1403a36251a754a1364b1ac66259fc3607ff25a6d307b071336e9e0a438bece2b6465027d620968bc1684693845688d7f10bb17549d570ac807878823e229d557c958b96bb6d93a88f1c2899f63731bafd11c7c7f240da975281fe438c2b40fc41df63d41e3d72694d69a44ce56784b627e3b9ab3f8eb453add289c4058eb712dc950f0e63b1d938838a1cb25cef8544d86c3425666bf6bd6d899b0aba00dba1ea5804a09d3f2372176260e930a101a2c45747d72ed88b829db1dd5c97813888c90e7c629295fc2b82f84134a950d0a2855da4f66fc9255d494b7f4c0aea067f330c698107f2a0d56d850d5e33a124f6e404f87811c7db632091c0b1decb74b8abd19d6ed845aa88d866941f4952a91e1e62e966e4ec08177a4d20e2fefd46737774ea5ec8f1c3554a6d4bdcd5527e1eba2267b9938a8b25e5c057bb14c1ee732152c1c431b70707021439026edfe3831bd3bb2156a090270b575356fe82c1bad2fb35abd2e68f9fde45fd5e8cfd740", 0x1000}], 0x1, &(0x7f0000001200)=[@iv={0x60, 0x117, 0x2, 0x4c, "655e8783367ce3c6449a37eda635bf395a138003595f1305f04436718c6ff0696481ba8fefcf368c1d10cb7a4963758ed2a5f25a158429b6ca8d66ffebf5fa43bf8e9a98091c6eccbe3e7113"}, @iv={0x98, 0x117, 0x2, 0x7e, "0a42e944a1bfed8a51bad3486a0e14e0730fc1e6965b1547c073f7be2d958ca98699f0023bd8f7ca60fd486ba584be5a4e8860836a83a8f4837abf9f66b20e174400994c64b39359dbd9c4a2f608027abe67e85e35d0189e3ca3d7403dc4b06ff1087e1bb636de3e595414d9a60f8dd34a25c5b5ea66b7f54e13179f7dec"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x28, 0x117, 0x2, 0x10, "a6b25700a574f12f8db3e562dba5c468"}], 0x138, 0x8000005}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000580)={0x0, @xdp, @qipcrtr, @xdp={0x2c, 0x0, 0x0, 0x21}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f00000013c0)={0x0, 'ip6gre0\x00', {0x1}, 0xffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001340)={0x0, @l2tp={0x2, 0x0, @empty, 0x3}, @ipx={0x4, 0x1, 0x2, "8f2bf826caa3", 0x1}, @vsock={0x28, 0x0, 0x2710, @host}, 0x7f, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000140)='veth0_vlan\x00', 0x8, 0x3, 0x1}) 20:29:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0xc0189436, &(0x7f0000000040)) 20:29:24 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x24000, 0x0) 20:29:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_modinfo}) 20:29:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@ldst={0x2}, @call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), 0x10}, 0x78) 20:29:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) 20:29:24 executing program 0: socketpair(0x1, 0x0, 0x4, &(0x7f0000000080)) [ 484.669779][T29268] IPVS: ftp: loaded support on port[0] = 21 20:29:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000140)={'erspan0\x00', @ifru_hwaddr=@dev}) 20:29:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541d, 0x0) 20:29:25 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/net/tun\x00', 0x40880, 0x0) 20:29:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'batadv_slave_0\x00', &(0x7f0000000280)=ANY=[]}) 20:29:25 executing program 2: syz_emit_ethernet(0xe5, &(0x7f0000000280)=ANY=[], 0x0) 20:29:25 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB='p'], 0x170}}, 0x0) 20:29:25 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x26000, 0x0) 20:29:25 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) 20:29:25 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x121041) write$evdev(r0, 0x0, 0x0) 20:29:25 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000040)) 20:29:25 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="800000000a000200aa"], 0x30}}, 0x0) [ 485.581231][T29328] IPVS: ftp: loaded support on port[0] = 21 20:29:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 20:29:25 executing program 3: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) r0 = socket(0x80000000000000a, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x4e23, @private}, 0x10, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000070000008602"], 0x10}, 0x0) [ 485.719488][ T34] audit: type=1804 audit(1605126565.628:16): pid=29341 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1151/file0/bus" dev="ramfs" ino=342941 res=1 errno=0 [ 485.732078][T29344] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:29:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000080)={0xa, 0x4ea7, 0x0, @local}, 0x1c, 0x0}, 0x0) 20:29:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x58}}, 0x0) 20:29:25 executing program 2: 20:29:25 executing program 4: 20:29:26 executing program 3: 20:29:26 executing program 5: 20:29:26 executing program 4: 20:29:26 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) [ 486.456253][T29389] IPVS: ftp: loaded support on port[0] = 21 [ 486.495022][ T34] audit: type=1804 audit(1605126566.408:17): pid=29391 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1151/file0/file0/bus" dev="ramfs" ino=344094 res=1 errno=0 20:29:26 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:26 executing program 2: 20:29:26 executing program 4: 20:29:26 executing program 5: 20:29:26 executing program 3: 20:29:26 executing program 2: 20:29:26 executing program 5: 20:29:26 executing program 4: 20:29:26 executing program 3: 20:29:26 executing program 3: 20:29:26 executing program 5: [ 486.863659][ T34] audit: type=1804 audit(1605126566.778:18): pid=29427 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1152/file0/bus" dev="ramfs" ino=345760 res=1 errno=0 20:29:27 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) [ 487.351802][T29437] IPVS: ftp: loaded support on port[0] = 21 20:29:27 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:27 executing program 4: 20:29:27 executing program 2: 20:29:27 executing program 3: 20:29:27 executing program 5: 20:29:27 executing program 2: 20:29:27 executing program 3: 20:29:27 executing program 4: 20:29:27 executing program 5: 20:29:27 executing program 2: 20:29:27 executing program 4: [ 488.020873][ T34] audit: type=1804 audit(1605126567.938:19): pid=29474 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1153/file0/bus" dev="ramfs" ino=344279 res=1 errno=0 20:29:28 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) [ 488.225241][T29479] IPVS: ftp: loaded support on port[0] = 21 20:29:28 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:28 executing program 3: 20:29:28 executing program 5: 20:29:28 executing program 2: 20:29:28 executing program 4: 20:29:28 executing program 5: 20:29:28 executing program 3: 20:29:28 executing program 2: 20:29:28 executing program 4: 20:29:28 executing program 3: 20:29:28 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:29 executing program 5: [ 489.142486][T29521] IPVS: ftp: loaded support on port[0] = 21 [ 489.265328][ T34] audit: type=1804 audit(1605126569.178:20): pid=29548 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1154/file0/bus" dev="ramfs" ino=346907 res=1 errno=0 20:29:30 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) socket$unix(0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:30 executing program 2: 20:29:30 executing program 4: 20:29:30 executing program 3: 20:29:30 executing program 5: 20:29:30 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x0, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:30 executing program 4: 20:29:30 executing program 3: 20:29:30 executing program 5: 20:29:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0xf4240, &(0x7f0000000040)=@framed={{}, [@ldst, @call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, 0x0}, 0x78) [ 490.175370][T29567] IPVS: ftp: loaded support on port[0] = 21 20:29:30 executing program 3: 20:29:30 executing program 4: [ 490.465107][ T34] audit: type=1804 audit(1605126570.378:21): pid=29600 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1155/file0/bus" dev="ramfs" ino=344800 res=1 errno=0 20:29:31 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:31 executing program 5: 20:29:31 executing program 2: 20:29:31 executing program 3: 20:29:31 executing program 4: 20:29:31 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x0, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:31 executing program 3: 20:29:31 executing program 5: 20:29:31 executing program 4: 20:29:31 executing program 2: [ 491.351725][T29616] IPVS: ftp: loaded support on port[0] = 21 20:29:31 executing program 3: 20:29:31 executing program 2: [ 491.541215][ T34] audit: type=1804 audit(1605126571.458:22): pid=29647 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1156/file0/bus" dev="ramfs" ino=350259 res=1 errno=0 20:29:32 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:32 executing program 4: 20:29:32 executing program 5: 20:29:32 executing program 2: 20:29:32 executing program 3: 20:29:32 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x0, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:32 executing program 5: 20:29:32 executing program 3: 20:29:32 executing program 4: 20:29:32 executing program 2: [ 492.426045][T29661] IPVS: ftp: loaded support on port[0] = 21 20:29:32 executing program 2: 20:29:32 executing program 4: [ 492.700563][ T34] audit: type=1804 audit(1605126572.619:23): pid=29693 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1157/file0/bus" dev="ramfs" ino=350341 res=1 errno=0 20:29:33 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:33 executing program 3: 20:29:33 executing program 5: 20:29:33 executing program 4: 20:29:33 executing program 2: 20:29:33 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:33 executing program 5: 20:29:33 executing program 4: 20:29:33 executing program 3: 20:29:33 executing program 2: 20:29:33 executing program 4: 20:29:33 executing program 5: [ 493.342712][ T34] audit: type=1804 audit(1605126573.259:24): pid=29712 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1158/file0/bus" dev="ramfs" ino=350411 res=1 errno=0 [ 493.346041][T29713] IPVS: ftp: loaded support on port[0] = 21 20:29:33 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:33 executing program 3: 20:29:33 executing program 2: 20:29:33 executing program 5: 20:29:33 executing program 4: 20:29:33 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:34 executing program 3: 20:29:34 executing program 2: 20:29:34 executing program 5: 20:29:34 executing program 4: [ 494.135510][T29751] IPVS: ftp: loaded support on port[0] = 21 20:29:34 executing program 2: 20:29:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2000, 0x0) [ 494.328351][ T34] audit: type=1804 audit(1605126574.239:25): pid=29764 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1159/file0/bus" dev="ramfs" ino=350943 res=1 errno=0 20:29:34 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0xf0ff7f) 20:29:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}]}, 0x2c}}, 0x0) 20:29:34 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5421, 0xffffffffffffffff) 20:29:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f00000019c0)=[{&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000340)="b724", 0x2}], 0x1}, {&(0x7f0000000540)=@abs, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40845}], 0x2, 0x0) 20:29:34 executing program 3: setuid(0xee01) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) 20:29:34 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:34 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40042408, 0xffffffffffffffff) 20:29:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003540)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000240)="d613f5", 0x3}, {&(0x7f0000000180)="1dcc37b3754abe897b2f359790e8ec2fc8f3af3729cba0e9e255a2b1", 0x1c}, {&(0x7f00000013c0)="affa3a0bcc1e5c6a427339e26655cf100398237ae428286d400ebb750ab242f55f1efc4b6c84ce8a0d75b8ad673c28c309ea1f0bdfccadc7311b7b076501bb11e12f035920a05963e30a26", 0x4b}, {&(0x7f0000001440)="f9cab5e57e18d07a2cbd5423d0eefbaf013de4d4cdbadc22956ca0a96cfbe741beaba1aab90dd95c09d27352a75735baadd33616d2339cacbfb26ebe0a469245ff33750ede5181a906c3faa6965afd1aa72d50b5a5fdab354c4a4491a7480f2278a753d4f51ed14e9bf2", 0x6a}], 0x4}}], 0x2, 0x0) [ 494.799131][T29800] IPVS: ftp: loaded support on port[0] = 21 20:29:34 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x442) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) 20:29:34 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:34 executing program 3: setuid(0xee01) delete_module(0x0, 0x0) 20:29:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) r1 = eventfd(0x0) dup3(r1, r0, 0x0) 20:29:34 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0xf0ff7f) 20:29:34 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, 0x0) 20:29:35 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:35 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f00000004c0)) 20:29:35 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080), 0x4) 20:29:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000003540)=[{{&(0x7f0000000340)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x0) 20:29:35 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:35 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0xf0ff7f) [ 495.250656][T29852] IPVS: ftp: loaded support on port[0] = 21 20:29:35 executing program 5: prlimit64(0x0, 0x0, &(0x7f00000002c0)={0x2}, 0x0) 20:29:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000680)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private}, 0x10, 0x0}}, {{&(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10, 0x0}}], 0x2, 0x0) 20:29:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000006d80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f00000000c0)='v', 0x1}, {&(0x7f0000000240)="84", 0x1}], 0x3}], 0x1, 0x0) 20:29:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x8, 0xbc1f}, {0x6}]}) 20:29:35 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 20:29:35 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:35 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000049c0)={0x0, 0x0, &(0x7f0000004980)={&(0x7f0000004840)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x1400000000000000}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 20:29:35 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:35 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) [ 495.614489][ T34] audit: type=1804 audit(1605126575.529:26): pid=29898 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1163/file0/bus" dev="ramfs" ino=356530 res=1 errno=0 [ 495.692698][T29902] IPVS: ftp: loaded support on port[0] = 21 20:29:35 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 20:29:35 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:35 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x8906, 0x0) 20:29:35 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) [ 495.874820][ T34] audit: type=1326 audit(1605126575.689:27): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29890 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 [ 496.102389][ T34] audit: type=1804 audit(1605126575.739:28): pid=29908 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1164/file0/bus" dev="ramfs" ino=355547 res=1 errno=0 [ 496.221853][ T34] audit: type=1804 audit(1605126575.949:29): pid=29938 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1165/file0/bus" dev="ramfs" ino=356963 res=1 errno=0 20:29:36 executing program 5: r0 = semget(0x3, 0x4, 0x206) semctl$IPC_RMID(r0, 0x0, 0x0) 20:29:36 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:36 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:36 executing program 3: syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@multicast, @link_local, @val={@void}, {@mpls_uc={0x8100, {[], @ipv6=@dccp_packet={0x0, 0x6, "9b071a", 0x10, 0x21, 0x0, @mcast2, @private0, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d4def4", 0x0, "b6d6d8"}}}}}}}}, 0x0) 20:29:36 executing program 4: ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000200)={0x0, 0x80000000}) perf_event_open(&(0x7f0000000180)={0x0, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:29:36 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) [ 496.450247][ T34] audit: type=1326 audit(1605126576.289:30): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29890 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 [ 496.522547][T29947] IPVS: ftp: loaded support on port[0] = 21 20:29:36 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="000000e100"/20, @ANYRES32]) 20:29:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x58}}, 0x0) 20:29:36 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0xb, 0x201, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0xd, 0x1, '},$/(\'!%^'}]}, 0x24}}, 0x0) 20:29:36 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:29:36 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="000000e100"/20, @ANYRES32]) 20:29:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000049c0)={0x0, 0x0, &(0x7f0000004980)={&(0x7f0000004840)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 20:29:36 executing program 3: setuid(0xee01) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 496.755283][ T34] audit: type=1804 audit(1605126576.509:31): pid=29951 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1166/file0/bus" dev="ramfs" ino=356297 res=1 errno=0 20:29:36 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:36 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="000000e100"/20, @ANYRES32]) 20:29:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000006d80)=[{0x0, 0x0, 0x0}, {&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001900)=ANY=[], 0x90}], 0x2, 0x0) 20:29:36 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:36 executing program 2: r0 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r0, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r0, @ANYBLOB="000000e100"/20, @ANYRES32=r0]) 20:29:36 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000001740)='/dev/vcsa#\x00', 0x5, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) 20:29:36 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0xf0ff7f) 20:29:36 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind(r0, &(0x7f0000001e40)=@can, 0x80) [ 497.047707][ T34] audit: type=1804 audit(1605126576.779:32): pid=29991 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1167/file0/bus" dev="ramfs" ino=357363 res=1 errno=0 [ 497.261027][ T34] audit: type=1804 audit(1605126576.899:33): pid=30005 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1168/file0/bus" dev="ramfs" ino=358415 res=1 errno=0 20:29:37 executing program 3: setuid(0xee01) r0 = getuid() ioprio_set$uid(0x3, r0, 0x0) 20:29:37 executing program 2: r0 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r0, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r0, @ANYBLOB="000000e100"/20, @ANYRES32=r0]) 20:29:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'gre0\x00', 0x0}) 20:29:37 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0xf0ff7f) 20:29:37 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "9d6d7359b5abe2b98d6a69aa805c08b92b6a95bd32b946ffc3876618233164a8e426b4bdeb277b160a43883615ff038144933eb869da864c0f7db64820ec4e78911162a36a21b4c95d46ea7aec66533a0939be26d126145652f81ec0261a563f2eff77b22fd4526a127de41db4945749931af4552917052d5b23465aa7efae53168f095f655fc72b3cb4894a131c1cdff831200c95a422bd7566429f27943733e6bc4648611c98bdace9a2a1c47078d5d03aaf2ae01e20ce4b4258c50c65885d2bc3d2744e6ecbef2da2a971084c0fd1dff84856edf45209a4a758d21255dd3639fc0854802a9c1417cbf1e554ba9f789ecbbb0bc21527b3bb885af35d2bb4627ab79fcbe588b7c88c99ddc96c6c157d402988d9173c3649bbebd8675c86cd93b7c633f8e7c37791470b4238cb3985cb5dc6cecfb1916e1e14200a0c2faf34335bfdaeea1f91cd42e6d21ce8f234d93330195c93743234e57e90c435ee0e6093cda5036f7760e12c0e0eaabfa9c66be5ff574566a4f5374b8e1b0fe3b10115f8fc2ae7decd8d58bf390628065cd4b887df14a52e545d8cfdf1679bb4e90bb35ef4478ae6ea3e23e4ea58acf6bfc4f04dac3a2498180c378eee6a46f32fd3eb2accb888d8ee0eaf5981c0ebfe1a230c0779e451c2445a76ee5ac2e9dcd38727dfb9392117e62ad4b4bbd145be568349c82344464eedb80503ba2784c8167cfb75"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:37 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000006880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:29:38 executing program 2: r0 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r0, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r0, @ANYBLOB="000000e100"/20, @ANYRES32=r0]) 20:29:38 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0xf0ff7f) 20:29:38 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 20:29:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) [ 498.121933][T30037] IPVS: ftp: loaded support on port[0] = 21 20:29:38 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:38 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000e40)=[{0x0, 0x0, 0x0}, {&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4004800}], 0x2, 0x0) 20:29:38 executing program 4: syz_open_dev$sg(0xffffffffffffffff, 0x0, 0x0) 20:29:38 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) [ 498.391474][ T34] audit: type=1804 audit(1605126578.309:34): pid=30075 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1172/bus" dev="sda1" ino=16226 res=1 errno=0 20:29:38 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)) 20:29:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8}]}, 0x24}}, 0x0) 20:29:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000006d80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f00000000c0)='v', 0x1}], 0x2}, {&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001840), 0x0, 0x0, 0x90}], 0x2, 0x0) 20:29:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f00000000c0)={'gre0\x00', 0x0}) 20:29:39 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:39 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:39 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) [ 499.539322][T30106] IPVS: ftp: loaded support on port[0] = 21 20:29:39 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(0x0, 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000006d80)=[{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f00000000c0)='v', 0x1}, {&(0x7f0000000240)="84", 0x1}], 0x3}, {&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001840), 0x0, 0x0, 0x90}], 0x2, 0x0) 20:29:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f0000002b40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x40}], 0x1, 0x0) [ 499.630684][ T34] audit: type=1804 audit(1605126579.549:35): pid=30112 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1173/bus" dev="sda1" ino=15841 res=1 errno=0 20:29:39 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvmmsg(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 20:29:39 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(0x0, 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:39 executing program 4: 20:29:39 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:39 executing program 3: 20:29:39 executing program 5: 20:29:39 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(0x0, 0x2) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) [ 499.937527][T30149] IPVS: ftp: loaded support on port[0] = 21 20:29:40 executing program 3: 20:29:40 executing program 4: 20:29:40 executing program 5: 20:29:40 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:40 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:40 executing program 4: [ 500.514613][T30183] IPVS: ftp: loaded support on port[0] = 21 20:29:40 executing program 3: 20:29:40 executing program 5: 20:29:40 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:40 executing program 4: 20:29:40 executing program 5: 20:29:40 executing program 3: 20:29:40 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) [ 500.735283][ T34] audit: type=1804 audit(1605126580.649:36): pid=30212 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1174/bus" dev="sda1" ino=16373 res=1 errno=0 20:29:40 executing program 4: 20:29:40 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) fcntl$addseals(r1, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) [ 500.931822][T30222] IPVS: ftp: loaded support on port[0] = 21 20:29:41 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xf0ff7f) 20:29:41 executing program 3: 20:29:41 executing program 5: 20:29:41 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:41 executing program 4: 20:29:41 executing program 1: unshare(0x40000000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000800)={0x81, "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"}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x10, &(0x7f0000000400)=ANY=[@ANYRES32=r4], &(0x7f0000000280)=0xa6) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1000}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x6, 0xcad7, 0x40, 0x0, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x4, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffd, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) 20:29:41 executing program 4: 20:29:41 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) 20:29:41 executing program 3: 20:29:41 executing program 5: 20:29:41 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r1 = memfd_create(&(0x7f0000000080)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="000000e100"/20, @ANYRES32=r1]) [ 501.682279][T30258] IPVS: ftp: loaded support on port[0] = 21 20:29:41 executing program 4: [ 501.824123][ T34] audit: type=1804 audit(1605126581.740:37): pid=30275 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir926925028/syzkaller.rd2XZk/1175/file0/bus" dev="sda1" ino=16370 res=1 errno=0 [ 502.407042][T30281] ================================================================== [ 502.417395][T30281] BUG: KCSAN: data-race in ondemand_readahead / ondemand_readahead [ 502.425899][T30281] [ 502.428755][T30281] write to 0xffff888100d157a4 of 4 bytes by task 30275 on cpu 1: [ 502.437000][T30281] ondemand_readahead+0x31e/0x780 [ 502.444444][T30281] page_cache_sync_ra+0x1ab/0x1c0 [ 502.450377][T30281] generic_file_buffered_read+0x38d/0x2110 [ 502.456198][T30281] generic_file_read_iter+0x80/0x3d0 [ 502.462709][T30281] ext4_file_read_iter+0x2d0/0x420 [ 502.469910][T30281] generic_file_splice_read+0x22a/0x310 [ 502.477574][T30281] splice_direct_to_actor+0x2aa/0x650 [ 502.483641][T30281] do_splice_direct+0xf5/0x170 [ 502.489853][T30281] do_sendfile+0x574/0xb70 [ 502.494936][T30281] __x64_sys_sendfile64+0xf2/0x130 [ 502.501068][T30281] do_syscall_64+0x39/0x80 [ 502.506411][T30281] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 502.513508][T30281] [ 502.516296][T30281] read to 0xffff888100d157a4 of 4 bytes by task 30281 on cpu 0: [ 502.528457][T30281] ondemand_readahead+0x186/0x780 [ 502.536531][T30281] page_cache_sync_ra+0x1ab/0x1c0 [ 502.543083][T30281] generic_file_buffered_read+0x38d/0x2110 [ 502.551722][T30281] generic_file_read_iter+0x80/0x3d0 [ 502.559114][T30281] ext4_file_read_iter+0x2d0/0x420 [ 502.566679][T30281] generic_file_splice_read+0x22a/0x310 [ 502.578330][T30281] splice_direct_to_actor+0x2aa/0x650 [ 502.585884][T30281] do_splice_direct+0xf5/0x170 [ 502.595114][T30281] do_sendfile+0x574/0xb70 [ 502.601125][T30281] __x64_sys_sendfile64+0xf2/0x130 [ 502.608710][T30281] do_syscall_64+0x39/0x80 [ 502.614114][T30281] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 502.620635][T30281] [ 502.623602][T30281] Reported by Kernel Concurrency Sanitizer on: [ 502.631248][T30281] CPU: 0 PID: 30281 Comm: syz-executor.0 Not tainted 5.10.0-rc3-syzkaller #0 [ 502.643613][T30281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.657922][T30281] ================================================================== [ 502.668613][T30281] Kernel panic - not syncing: panic_on_warn set ... [ 502.678348][T30281] CPU: 0 PID: 30281 Comm: syz-executor.0 Not tainted 5.10.0-rc3-syzkaller #0 [ 502.693882][T30281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.712120][T30281] Call Trace: [ 502.717172][T30281] dump_stack+0x116/0x15d [ 502.721974][T30281] panic+0x1e7/0x5fa [ 502.727283][T30281] ? vprintk_emit+0x2f2/0x370 [ 502.732997][T30281] kcsan_report+0x67b/0x680 [ 502.739721][T30281] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 502.745854][T30281] ? ondemand_readahead+0x186/0x780 [ 502.751390][T30281] ? page_cache_sync_ra+0x1ab/0x1c0 [ 502.758521][T30281] ? generic_file_buffered_read+0x38d/0x2110 [ 502.768546][T30281] ? generic_file_read_iter+0x80/0x3d0 [ 502.776358][T30281] ? ext4_file_read_iter+0x2d0/0x420 [ 502.781754][T30281] ? generic_file_splice_read+0x22a/0x310 [ 502.791633][T30281] ? splice_direct_to_actor+0x2aa/0x650 [ 502.800792][T30281] ? do_splice_direct+0xf5/0x170 [ 502.807073][T30281] ? do_sendfile+0x574/0xb70 [ 502.812511][T30281] ? __x64_sys_sendfile64+0xf2/0x130 [ 502.819333][T30281] ? do_syscall_64+0x39/0x80 [ 502.824848][T30281] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 502.831497][T30281] ? generic_perform_write+0x332/0x3a0 [ 502.838157][T30281] kcsan_setup_watchpoint+0x46a/0x4d0 [ 502.843731][T30281] ondemand_readahead+0x186/0x780 [ 502.850200][T30281] page_cache_sync_ra+0x1ab/0x1c0 [ 502.855425][T30281] generic_file_buffered_read+0x38d/0x2110 [ 502.861719][T30281] generic_file_read_iter+0x80/0x3d0 [ 502.867951][T30281] ? aa_file_perm+0x132/0xdb0 [ 502.874979][T30281] ext4_file_read_iter+0x2d0/0x420 [ 502.882221][T30281] generic_file_splice_read+0x22a/0x310 [ 502.889487][T30281] ? splice_shrink_spd+0x60/0x60 [ 502.894712][T30281] splice_direct_to_actor+0x2aa/0x650 [ 502.902057][T30281] ? do_splice_direct+0x170/0x170 [ 502.909190][T30281] do_splice_direct+0xf5/0x170 [ 502.915729][T30281] do_sendfile+0x574/0xb70 [ 502.924465][T30281] __x64_sys_sendfile64+0xf2/0x130 [ 502.933616][T30281] do_syscall_64+0x39/0x80 [ 502.939024][T30281] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 502.946579][T30281] RIP: 0033:0x45deb9 [ 502.950819][T30281] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.972625][T30281] RSP: 002b:00007f845c5c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 502.981390][T30281] RAX: ffffffffffffffda RBX: 0000000000027f40 RCX: 000000000045deb9 [ 502.996972][T30281] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 503.005471][T30281] RBP: 000000000118c010 R08: 0000000000000000 R09: 0000000000000000 [ 503.014367][T30281] R10: 0000000000f0ff7f R11: 0000000000000246 R12: 000000000118bfd4 [ 503.025906][T30281] R13: 00007ffc2839ff3f R14: 00007f845c5c49c0 R15: 000000000118bfd4 [ 503.037212][T30281] Kernel Offset: disabled [ 503.043609][T30281] Rebooting in 86400 seconds..