d, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1110.141211][T19958] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1110.156590][T19952] kvm [19950]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702111 [ 1110.159193][ T9313] usb 1-1: device descriptor read/8, error -71 [ 1110.232285][T19966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1110.255594][T19952] kvm [19950]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x0 [ 1110.492252][ T1340] net_ratelimit: 4 callbacks suppressed [ 1110.492259][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1110.662145][ T9313] usb 1-1: new high-speed USB device number 53 using dummy_hcd [ 1110.912422][ T9313] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 1110.920025][ T9313] usb 1-1: can't read configurations, error -61 [ 1110.927078][ T9313] usb usb1-port1: unable to enumerate USB device [ 1111.543129][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1111.612240][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1111.782527][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1112.572366][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:35:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000040)={r4, 0x26}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:35:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000020000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:35:53 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xed, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:35:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x2010, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x10000, 0x0) sendmsg$unix(r2, &(0x7f00000004c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000200)="25d192c6fe2d", 0x6}, {&(0x7f0000000240)="91e147b99415a11158fb3e1a12b3277b891745414057ef14de1d85c53a68bc7991f4fc49c1a7868d2606f7610b2aff06475487b111f3703443b244324ea9e132ff949d05c040569ac7604fc09b131a90149f964b84bc40b31111012a9950c98ba4fb0414a7522f6ed35c4b2f1ba1daaddb41ed183eab467e85bb2aa3e386690e885fb3ff049dbd77e5660bd6135516f2a6a0818e4f8a56b133ab5e19047abc2db78d652bd91e2b6e2ff3dceb84dff0730db86ea5c09ed53a6bc40e973c3eb48f96e28288c1fcb62952699965ec8163dbc308001dd767cf074e2b6a80e43d0df55fab261dfa4ad5890f66d2667dc7115ba125a65d58", 0xf5}], 0x2, &(0x7f0000000400)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r2]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4]}}], 0x90, 0x24008000}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$AUDIT_GET(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x20, 0x70bd29, 0x25dfdbff, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004014}, 0x4000000) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, r7, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f00000ed000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xbc, 0x10000000002) 21:35:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x314}]}, 0x1c}}, 0x0) 21:35:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x10001, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e35, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000200)=0x10000000003e, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000300)=ANY=[], 0x34}}, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=ANY=[], 0x8) sendto$inet6(r1, &(0x7f00000003c0)="c070e22fb8c431650ac0c797e5387cb3a7bfa53ca63250411c80794ca97c0097f0ab078492f2696f95376c19f8ab52b101711ddf6e20187022008c618110fc76f7", 0x41, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "cee85c9ecaf799df", "3b93e950fa04d8afb9d41092e2036e90", "2744b417", "0c0399d43b480c7b"}, 0x28) [ 1113.008047][T19992] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1113.008070][T19993] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1113.046361][T19992] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:35:53 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xed, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:35:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000030000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:35:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x334}]}, 0x1c}}, 0x0) [ 1113.059119][T19999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1113.063553][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1113.077616][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:35:53 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1a0, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:35:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000, 0x40240}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:35:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000040000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1113.190842][T20015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1113.213129][T20023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1113.392154][T12097] usb 1-1: new high-speed USB device number 54 using dummy_hcd [ 1113.434986][ T27] audit: type=1800 audit(1597095353.580:164): pid=19991 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="cgroup.controllers" dev="sda1" ino=15912 res=0 errno=0 [ 1113.612247][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1113.752214][T12097] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1113.852457][T12097] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1113.861533][T12097] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1113.869950][T12097] usb 1-1: Manufacturer: syz [ 1113.875360][T12097] usb 1-1: config 0 descriptor?? [ 1113.914140][T12097] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1114.114047][ T9313] usb 1-1: USB disconnect, device number 54 [ 1114.882302][ T9313] usb 1-1: new high-speed USB device number 55 using dummy_hcd [ 1115.262198][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1115.372598][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1115.381644][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1115.390539][ T9313] usb 1-1: Manufacturer: syz [ 1115.396128][ T9313] usb 1-1: config 0 descriptor?? [ 1115.435117][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:35:55 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000000000)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001903056facdb66bdd000000000904"], 0x0) 21:35:55 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1a0, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:35:55 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="1c0000001200050f0c1000000049b276062f763e9b", 0x15, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) 21:35:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000050000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:35:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x354}]}, 0x1c}}, 0x0) 21:35:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000000)={0x1, 0x7, 0x4, {0x9, 0xffffffe1}, 0x8, 0x10000}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00') mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1115.642273][ T5057] usb 1-1: USB disconnect, device number 55 21:35:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000080000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1115.701791][T20077] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1115.711468][ T9313] net_ratelimit: 5 callbacks suppressed [ 1115.711474][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1115.735852][T20080] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:35:55 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1a0, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1115.755693][T20083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:35:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x378}]}, 0x1c}}, 0x0) 21:35:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000090000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:35:56 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1a4, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1115.870275][T20092] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:35:56 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1a4, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1115.919563][T20097] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1116.092148][ T5057] usb 1-1: new high-speed USB device number 56 using dummy_hcd [ 1116.452379][ T5057] usb 1-1: config 144 has an invalid descriptor of length 205, skipping remainder of the config [ 1116.463986][ T5057] usb 1-1: config 144 has 0 interfaces, different from the descriptor's value: 1 [ 1116.498132][T20107] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1116.552446][ T5057] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1116.561505][ T5057] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1116.570629][ T5057] usb 1-1: Manufacturer: syz [ 1116.742309][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1116.852746][ T5057] usb 1-1: USB disconnect, device number 56 [ 1117.533033][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1117.582140][ T1340] usb 1-1: new high-speed USB device number 57 using dummy_hcd [ 1117.692738][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1117.773070][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1117.781561][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1117.790054][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1117.798655][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1117.952152][ T1340] usb 1-1: config 144 has an invalid descriptor of length 205, skipping remainder of the config [ 1117.962906][ T1340] usb 1-1: config 144 has 0 interfaces, different from the descriptor's value: 1 [ 1118.042428][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1118.051439][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1118.060169][ T1340] usb 1-1: Manufacturer: syz 21:35:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000000)={0x3, 0x3, 0x200, @dev={[], 0x21}, 'batadv_slave_1\x00'}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:35:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000000f0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:35:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x398}]}, 0x1c}}, 0x0) 21:35:58 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1a4, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:35:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x480480, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x7, 0x12, 0x13, 0x11, "d5a1c700ce7510ba221bc0fc04bc0957e496d0e5e7f51999baceb1a0c210aee1e29b1e85725652177364b4488a6a21be486bc33d8ee2bf7b51110190601306ec", "4796c59f8099b0ea23beee45560af61bf1887f6e70d6436cd51ded61c9c177fd", [0xfffffffffffffffa, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x1f, 0x0, 0x0, 0x0, 0xffffffffffffb0b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4000000000, r2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:35:58 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="700000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000400012800e0001006970366772657461700000002c000280080005"], 0x70}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) [ 1118.334706][ T1340] usb 1-1: USB disconnect, device number 57 [ 1118.344562][T20130] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1118.355678][T20131] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1118.374465][T20131] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 21:35:58 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1e0, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x40, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1118.375107][T20140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:35:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000140000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:35:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x3b8}]}, 0x1c}}, 0x0) 21:35:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="8c", 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) sendfile(r2, r5, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4) 21:35:58 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1e0, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x40, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:35:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000340000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1118.526621][T20154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1118.564961][T20161] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1118.647271][ T27] audit: type=1800 audit(1597095358.790:165): pid=20165 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=15997 res=0 errno=0 [ 1118.802274][ T1340] usb 1-1: new high-speed USB device number 58 using dummy_hcd [ 1119.172451][ T1340] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1119.262191][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1119.271345][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1119.279987][ T1340] usb 1-1: Manufacturer: syz [ 1119.285606][ T1340] usb 1-1: config 0 descriptor?? [ 1119.324976][ T1340] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1119.523740][ T1340] usb 1-1: USB disconnect, device number 58 [ 1120.292298][T12097] usb 1-1: new high-speed USB device number 59 using dummy_hcd [ 1120.652156][T12097] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1120.732536][ T1082] net_ratelimit: 5 callbacks suppressed [ 1120.732543][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1120.733595][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1120.743026][T12097] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1120.763330][T12097] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1120.771541][T12097] usb 1-1: Manufacturer: syz [ 1120.777270][T12097] usb 1-1: config 0 descriptor?? [ 1120.823915][T12097] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1120.892301][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x583040, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f00000000c0)={0x9, 0xf1c, 0x7ff, 0x3, 0x0, 0x80000001, 0x1}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SOUND_MIXER_INFO(r2, 0x805c4d65, &(0x7f0000000000)) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:36:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000880)={0x70, r3, 0x0, 0x70bd25, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6, 0x4, 0x1}}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x20008054) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r3, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:36:01 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x1e0, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x40, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x3d0}]}, 0x1c}}, 0x0) 21:36:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000480000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b09000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) bind$can_raw(r0, &(0x7f0000000140), 0x10) [ 1121.032266][ T9313] usb 1-1: USB disconnect, device number 59 21:36:01 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x200, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x5e, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x200}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000001520000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1121.079473][T20206] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f322e0f0178000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d683ed", 0x44}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:36:01 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x200, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x5e, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x200}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000600000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1121.150679][T20219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x3e4}]}, 0x1c}}, 0x0) [ 1121.237096][T20224] kvm [20222]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x0 [ 1121.330616][T20240] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1121.365480][T20242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1121.482188][ T9313] usb 1-1: new high-speed USB device number 60 using dummy_hcd [ 1121.842191][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1121.932664][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1121.941766][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1121.950498][ T9313] usb 1-1: Manufacturer: syz [ 1121.956026][ T9313] usb 1-1: config 0 descriptor?? [ 1121.961032][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1121.994132][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1122.193808][ T5057] usb 1-1: USB disconnect, device number 60 [ 1122.663450][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1122.962207][ T9102] usb 1-1: new high-speed USB device number 61 using dummy_hcd [ 1122.972910][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1123.352446][ T9102] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1123.452646][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1123.461670][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1123.470538][ T9102] usb 1-1: Manufacturer: syz [ 1123.476264][ T9102] usb 1-1: config 0 descriptor?? [ 1123.524960][ T9102] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:36:03 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc) 21:36:03 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x200, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x5e, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x200}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000680000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:03 executing program 5: syz_usb_connect(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000f1b6df086a080200c5670000000109022400010000000009040200023c09000009050112080700000009058c0a08"], 0x0) 21:36:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x3fc}]}, 0x1c}}, 0x0) 21:36:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000000)={0x0, 0x7, 0x1, 0x2, &(0x7f0000ad8000/0x3000)=nil, 0x101}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1123.732328][ T9313] usb 1-1: USB disconnect, device number 61 [ 1123.771723][T20287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:03 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x210, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x6d, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x210}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1123.782306][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1123.807149][T20298] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000800000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:04 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x210, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x6d, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x210}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x414}]}, 0x1c}}, 0x0) [ 1123.852714][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000ffffff9e0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1123.936864][T20309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1123.961791][T20312] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1124.016930][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1124.052198][ T1340] usb 6-1: new high-speed USB device number 66 using dummy_hcd [ 1124.183775][ T9313] usb 1-1: new high-speed USB device number 62 using dummy_hcd [ 1124.302175][ T1340] usb 6-1: Using ep0 maxpacket: 8 [ 1124.422908][ T1340] usb 6-1: config 0 has an invalid interface number: 2 but max is 0 [ 1124.430984][ T1340] usb 6-1: config 0 has no interface number 0 [ 1124.437984][ T1340] usb 6-1: config 0 interface 2 altsetting 0 endpoint 0x1 has invalid maxpacket 1800, setting to 1024 [ 1124.449450][ T1340] usb 6-1: config 0 interface 2 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1124.459747][ T1340] usb 6-1: config 0 interface 2 altsetting 0 bulk endpoint 0x8C has invalid maxpacket 8 [ 1124.469875][ T1340] usb 6-1: New USB device found, idVendor=086a, idProduct=0002, bcdDevice=67.c5 [ 1124.479197][ T1340] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1124.488119][ T1340] usb 6-1: config 0 descriptor?? [ 1124.512358][T20291] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1124.519232][T20291] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1124.542200][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1124.582205][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1124.632169][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1124.641194][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1124.672121][ T9313] usb 1-1: Manufacturer: syz [ 1124.689956][ T9313] usb 1-1: config 0 descriptor?? [ 1124.734004][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1124.738573][ T5057] usb 6-1: USB disconnect, device number 66 [ 1124.934263][ T9313] usb 1-1: USB disconnect, device number 62 [ 1125.522150][ T1340] usb 6-1: new high-speed USB device number 67 using dummy_hcd [ 1125.712142][ T5057] usb 1-1: new high-speed USB device number 63 using dummy_hcd [ 1125.762144][ T1340] usb 6-1: Using ep0 maxpacket: 8 [ 1125.852631][ T1082] net_ratelimit: 1 callbacks suppressed [ 1125.852637][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1125.866247][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1125.912213][ T1340] usb 6-1: config 0 has an invalid interface number: 2 but max is 0 [ 1125.920212][ T1340] usb 6-1: config 0 has no interface number 0 [ 1125.926357][ T1340] usb 6-1: config 0 interface 2 altsetting 0 endpoint 0x1 has invalid maxpacket 1800, setting to 1024 [ 1125.937371][ T1340] usb 6-1: config 0 interface 2 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1125.947325][ T1340] usb 6-1: config 0 interface 2 altsetting 0 bulk endpoint 0x8C has invalid maxpacket 8 [ 1125.957105][ T1340] usb 6-1: New USB device found, idVendor=086a, idProduct=0002, bcdDevice=67.c5 [ 1125.966135][ T1340] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1125.976729][ T1340] usb 6-1: config 0 descriptor?? [ 1125.993324][T20291] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1126.000114][T20291] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1126.072185][ T5057] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1126.092279][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1126.162390][ T5057] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1126.171435][ T5057] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1126.180912][ T5057] usb 1-1: Manufacturer: syz [ 1126.187036][ T5057] usb 1-1: config 0 descriptor?? [ 1126.224501][ T5057] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1126.232439][ T1340] usb 6-1: USB disconnect, device number 67 21:36:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e24, 0x40, @mcast1, 0xe6a2}, {0xa, 0x4e22, 0x3, @remote}, 0xfff8, [0x8, 0x0, 0x8, 0x2, 0x9, 0xbb, 0x6, 0xffff]}, 0x5c) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[], 0x0) 21:36:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x430}]}, 0x1c}}, 0x0) 21:36:06 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x210, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x6d, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x210}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000ffffffef0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x28011, r3, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x1) 21:36:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) socket$inet6(0xa, 0x3, 0x6) [ 1126.432247][ T5057] usb 1-1: USB disconnect, device number 63 21:36:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000fffffff00000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:06 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x214, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x74, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f24"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x214}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:06 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$setperm(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b09000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) [ 1126.480739][T20434] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1126.492897][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1126.505441][T20440] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000007fffffff0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x450}]}, 0x1c}}, 0x0) 21:36:06 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x214, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x74, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f24"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x214}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1126.671986][T20458] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1126.707992][T20465] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1126.812265][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1126.892612][ T5057] usb 1-1: new high-speed USB device number 64 using dummy_hcd [ 1126.916983][ T27] audit: type=1800 audit(1597095367.060:166): pid=20432 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="cgroup.controllers" dev="sda1" ino=15902 res=0 errno=0 [ 1127.143676][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1127.172142][ T5057] usb 1-1: device descriptor read/64, error 18 [ 1127.562145][ T5057] usb 1-1: device descriptor read/64, error 18 [ 1127.773133][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1127.852211][ T5057] usb 1-1: new high-speed USB device number 65 using dummy_hcd [ 1128.132174][ T5057] usb 1-1: device descriptor read/64, error 18 [ 1128.172220][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1128.422561][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1128.532150][ T5057] usb 1-1: device descriptor read/64, error 18 [ 1128.652183][ T5057] usb usb1-port1: attempt power cycle [ 1128.972552][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1129.372167][ T5057] usb 1-1: new high-speed USB device number 66 using dummy_hcd 21:36:09 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="5b63bc007f80001c00f540c007011514aa74000001000000e9a117b656"], 0x0) socket$inet(0x2, 0x2, 0xe0) 21:36:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) poll(&(0x7f0000000100)=[{r0}, {r3}], 0x2, 0x7ff) 21:36:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000ffffffff0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:09 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x214, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x74, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f24"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x214}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x464}]}, 0x1c}}, 0x0) 21:36:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x4, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:36:09 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x218, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x78, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x218}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1129.516802][T20483] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1129.526073][ T5057] usb 1-1: device descriptor read/8, error -71 21:36:09 executing program 5: 21:36:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00020000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1129.575660][T20490] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x478}]}, 0x1c}}, 0x0) 21:36:09 executing program 5: 21:36:09 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x208000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_SECDISCARD(r2, 0x127d, &(0x7f0000000000)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1129.697620][T20504] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1129.739985][T20510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1129.749767][ T5057] usb 1-1: device descriptor read/8, error -71 [ 1130.262173][ T5057] usb 1-1: new high-speed USB device number 67 using dummy_hcd [ 1130.432487][ T5057] usb 1-1: device descriptor read/8, error -61 [ 1130.702184][ T5057] usb 1-1: device descriptor read/8, error -61 [ 1130.822208][ T5057] usb usb1-port1: unable to enumerate USB device [ 1131.302716][ T1340] net_ratelimit: 3 callbacks suppressed [ 1131.302723][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1131.612645][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1131.620764][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1131.628888][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1132.332325][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00030000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:12 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x218, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x78, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x218}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:12 executing program 5: 21:36:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x47c}]}, 0x1c}}, 0x0) 21:36:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x3ff, @private0, 0xe4000000}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x7ff, @dev={0xfe, 0x80, [], 0xe}, 0x2}, @in6={0xa, 0x4e21, 0x2, @local}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @private=0xa010100}, @in6={0xa, 0x4e22, 0x2, @local, 0x3}, @in6={0xa, 0x4e20, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1f}], 0xbc) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x310a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = clone3(&(0x7f0000000700)={0x81000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x24}, &(0x7f0000000640)=""/41, 0x29, &(0x7f0000000680)=""/15, &(0x7f00000006c0)=[0x0, 0xffffffffffffffff, 0x0, 0x0, r1], 0x5, {r2}}, 0x58) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clone3(&(0x7f00000007c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xa}, &(0x7f0000000180)=""/63, 0x3f, &(0x7f0000000200)=""/114, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, r3, r4], 0x6, {r6}}, 0x58) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:12 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x208100, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x4000, 0xffffffff, {r2, r3/1000+60000}, {0x5, 0xc, 0x5, 0xfe, 0x10, 0x8, "18bce62f"}, 0x8, 0x0, @userptr, 0x8, 0x0, r5}) 21:36:12 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x218, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x78, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x218}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:12 executing program 5: [ 1132.684084][T20526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00040000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:12 executing program 5: [ 1132.729056][T20536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:12 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7a, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x490}]}, 0x1c}}, 0x0) 21:36:13 executing program 5: 21:36:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00050000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1132.843328][T20549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:13 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7a, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:13 executing program 5: [ 1132.893591][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1132.909513][T20551] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00080000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1133.102198][ T5057] usb 1-1: new high-speed USB device number 68 using dummy_hcd [ 1133.382703][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1133.462214][ T5057] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1133.533124][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1133.542546][ T5057] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1133.551599][ T5057] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1133.560172][ T5057] usb 1-1: Manufacturer: syz [ 1133.567185][ T5057] usb 1-1: config 0 descriptor?? [ 1133.615642][ T5057] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1133.815947][ T9313] usb 1-1: USB disconnect, device number 68 [ 1134.172347][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1134.172684][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1134.592132][ T9313] usb 1-1: new high-speed USB device number 69 using dummy_hcd [ 1134.973415][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1135.062558][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1135.071586][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1135.080288][ T9313] usb 1-1: Manufacturer: syz [ 1135.086449][ T9313] usb 1-1: config 0 descriptor?? [ 1135.125127][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:36:15 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000001c0)={0xb, 0x102, 0x4, {0x73d, 0x2, 0x18000000, 0xdfb}}) syz_usb_connect(0x4, 0x34, &(0x7f0000000100)=ANY=[@ANYBLOB="120100001c00f540c007011514aa74000001090222000100297765d21a9018db70abb655ba1f449035804ec773d8d4af9f7f9dcf5c"], 0x0) syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000200)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0xd0, 0x4, [{{0x9, 0x4, 0x0, 0xff, 0x2, 0x7, 0x1, 0x3, 0x27, "", {{{0x9, 0x5, 0x1, 0x2, 0x200, 0x1d, 0x1f, 0x7}}, [{{0x9, 0x5, 0x82, 0x2, 0x40, 0x0, 0x5}}]}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000240)={0xa, 0x6, 0x250, 0x0, 0x4, 0x8, 0x8, 0xff}, 0x17, &(0x7f0000000280)={0x5, 0xf, 0x17, 0x2, [@ext_cap={0x7, 0x10, 0x2, 0x4, 0x8, 0x8, 0x100}, @wireless={0xb, 0x10, 0x1, 0x8, 0x4, 0x8, 0x1, 0x1, 0x6}]}, 0x3, [{0xda, &(0x7f00000002c0)=@string={0xda, 0x3, "5264349054876da5f6ebbb0da0b6f70f0ea3d9e481b56ecccd87b14734ddc9b17a3f479636e0c3f4472be876d5a74f8bfd66e32e6a6b97a94fe6d58bcc9ddaf5198fa47cf41e3cee4ab8a66078099b294f2f8103c61e8d237cdcacbda9445f55344a203e41f8c038f79fc5774f722f2186965edc4f89b966ecdfab663a16e4604cc3d2c3bdaa7fe73544ce9cd3f38a0cea6319fe7dad9ab2b4835b150672a0b03c52bb41dee6d517805ea7c1a3e97a42167a8e4cac752677661b049e0a72f3b65277f78706e3281f2497000fa77829c809d96edc6c640573"}}, {0xf9, &(0x7f00000003c0)=@string={0xf9, 0x3, "91bf9c9ba36d381bab74b709855d58f96e0b1c22f8f05838c2ee6f05aaa069c67e8397581d7eb8a1b449390eab90022f71f4b26db3070139fd10d5cae3be0b65bcab2e3fe41b1e04bbfce112e370f20a5270d69b4bdcaddecc925366f3455a730e5264d18a7c311b9fd47224e3e4050e8d33446a2fb0d22e30d09d77ea1c3a3c6da640220ccbe7705400d9311ca81006f7fd4d204320872b3294a06aaa3886ad2414f49430b05382d206f439a5b95641d9c2cfcf68600821a4fbfa6a517f479d7ec4cdf25937995ced25f5b0f54126ddeace6d5ef69944ffa6656b7cf3de9cf93f1da93450ce777475691002faeebcab4305c9950b22c9"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x843}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = shmget(0x2, 0x1000, 0x10, &(0x7f0000ffd000/0x1000)=nil) get_mempolicy(&(0x7f0000000000), &(0x7f0000000140), 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x2) shmctl$SHM_LOCK(r2, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r4) r5 = fcntl$dupfd(r0, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept4$tipc(r5, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x0) r7 = fcntl$dupfd(r6, 0x0, r1) ioctl$USBDEVFS_CLAIMINTERFACE(r5, 0x8004550f, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r7, 0x2) 21:36:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4b0}]}, 0x1c}}, 0x0) 21:36:15 executing program 5: 21:36:15 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7a, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @local}, r3}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x1, r3, 0x30, 0x0, @ib={0x1b, 0x401, 0x0, {"69cc02054c29278f8923aef3bd45c0b1"}, 0xdf9, 0x5a7c, 0x100}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00090000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1135.324193][ T9313] usb 1-1: USB disconnect, device number 69 21:36:15 executing program 5: 21:36:15 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1135.395758][T20604] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1135.425447][T20611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4d0}]}, 0x1c}}, 0x0) 21:36:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000f0000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:15 executing program 5: 21:36:15 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1135.579107][T20622] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1135.641465][T20628] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1135.782338][ T9313] usb 1-1: new high-speed USB device number 70 using dummy_hcd [ 1136.032145][ T9313] usb 1-1: Using ep0 maxpacket: 16 [ 1136.232581][ T9313] usb 1-1: config 1 interface 0 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 64 [ 1136.242658][ T9313] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1136.402395][ T9313] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1136.411526][ T9313] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1136.421328][ T9313] usb 1-1: Product: ࡃ [ 1136.425529][ T9313] usb 1-1: Manufacturer: 뾑鮜涣ᬸ璫ষ嶅菱୮∜㡘կꂪ왩荾増縝ꆸ䦴ู邫⼂液޳㤁ჽ쫕뻣攋ꮼ㼮ᯤОﲻዡ烣૲灒鯖鋌晓䗳獚刎텤粊ᬱ풟⑲ฅ㎍橄뀯⻒퀰瞝ᳪ㰺ꙭ≀쬌烧T㇙ꠜؐﷷ⁍⁃⮇鐲檠㢪궆ᐤ铴뀰艓ے㧴릥䅖싙쿏恨℈ﮤ櫺网鵇쑾㝙岙◭냵䇵컪幭駶d斦籫列ᴿ㒩칐瑷極ȐꮼՃ闉∋ [ 1136.460195][ T9313] usb 1-1: SerialNumber: syz [ 1136.483219][T20607] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1136.492287][ T1340] net_ratelimit: 4 callbacks suppressed [ 1136.492293][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1136.662551][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1136.732584][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1136.803447][ T9313] usblp: can't set desired altsetting 255 on interface 0 [ 1136.814434][ T9313] usb 1-1: USB disconnect, device number 70 21:36:17 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:17 executing program 5: 21:36:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00140000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4f0}]}, 0x1c}}, 0x0) 21:36:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000240)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)="1b0efae699624881c284385abfcf34db4e56a273dde028983eb6bdf9284f1655899616c23462b0489b9c4dc0fde396", 0x2f}, {&(0x7f0000000300)="0c7f59d7a451b5c32a21e72d325164b2faccaa7a1f7c049ec7c5b0d1fb9659de9f1a25866ce8ed1d0a5e08523801daf3d644c62ee7098573c6fad04bba9ce05e99556cfc9bfc0344ffe850708518a8be42c2d11252ad7b768bf5124302c913671b420ce78efb4f42bf0f251ad6a8", 0x6e}, {&(0x7f0000000380)="694545616de56309feda16a54ceacea01a098bd684aca742fffd42a6448f173acc9777afa19adc84653f74652957c745e75b36b1d5e2b3992c0d19fe7e1cdce14410b612f642972ff8c2b80feee23931a7ba439275877b717c44720dadf9f1b4f9422ac27c9b08306f559cf8627a281d5d52fe1f216c9e567ec1b4cd22e04b00e93c72dcbbda1be1481531c8151d3ae7918a56e95f5f3670ce650e2b6caf34caf6761affa97d95ec5c8a9d6d5559", 0xae}, {&(0x7f0000000440)="76c129cbc6791b539c3d77e1534415bccfee1429fc3db2c97b5e116e3499cf119488fded1c897ef5eb3fb1acd481504f4e", 0x31}], 0x4}, 0x804) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000100)={0x8, @win={{0x9, 0x4, 0x0, 0x305}, 0x2, 0x200, &(0x7f0000000040)={{0x1, 0x4, 0x0, 0x6}, &(0x7f0000000000)={{0x3, 0x7f, 0xd8fc, 0x40}}}, 0x3, &(0x7f0000000080)="dbcdd53da827f009b79e70f050089d10586724f01d8009aa573f1f12bd3f3822a071876d76d8d45166929339a505c8d0d9f84aef62b202ca34418214c8d66b0a3c024c87de4f5dd16b67aeef95d7c822e102813aa66f3c8f84d2"}}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:36:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000080)={0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1137.258949][T20655] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:17 executing program 5: 21:36:17 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00340000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1137.305722][T20663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x510}]}, 0x1c}}, 0x0) 21:36:17 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x24) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:17 executing program 5: [ 1137.372633][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00480000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:17 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x52c}]}, 0x1c}}, 0x0) [ 1137.532653][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1137.682150][T11264] usb 1-1: new high-speed USB device number 71 using dummy_hcd [ 1138.052163][T11264] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1138.142208][T11264] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1138.151288][T11264] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1138.159677][T11264] usb 1-1: Manufacturer: syz [ 1138.166456][T11264] usb 1-1: config 0 descriptor?? [ 1138.203638][T11264] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1138.403499][ T1340] usb 1-1: USB disconnect, device number 71 [ 1138.573298][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1138.653408][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1138.972285][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1139.192151][ T9102] usb 1-1: new high-speed USB device number 72 using dummy_hcd [ 1139.562190][ T9102] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1139.612310][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1139.652555][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1139.661633][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1139.670263][ T9102] usb 1-1: Manufacturer: syz [ 1139.675968][ T9102] usb 1-1: config 0 descriptor?? [ 1139.715401][ T9102] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:36:20 executing program 0: syz_usb_connect(0x3, 0x34, &(0x7f0000000000)=ANY=[@ANYBLOB="120100001c00f5d1f88ea8b3f781fee65a40c007011514aa7400000109"], 0x0) 21:36:20 executing program 5: 21:36:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00600000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:20 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x54c}]}, 0x1c}}, 0x0) 21:36:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x8, @vbi={0x101, 0x96, 0x437, 0x3234564e, [0x100, 0x7fffffff], [0x6, 0xfffffffb], 0x1}}) [ 1139.913052][ T1340] usb 1-1: USB disconnect, device number 72 [ 1139.932631][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:20 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:20 executing program 5: [ 1139.978302][T20735] __nla_validate_parse: 4 callbacks suppressed [ 1139.978310][T20735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x56c}]}, 0x1c}}, 0x0) 21:36:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00680000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:20 executing program 5: [ 1140.024580][T20740] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:20 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1140.116110][T20747] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1140.143420][T20753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1140.442198][ T1340] usb 1-1: new high-speed USB device number 73 using dummy_hcd [ 1140.713269][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1141.102154][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1141.383425][ T1340] usb 1-1: new high-speed USB device number 74 using dummy_hcd [ 1141.692301][T11264] net_ratelimit: 2 callbacks suppressed [ 1141.692307][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1141.693138][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1141.698006][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1142.012302][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1142.112182][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1142.242172][ T1340] usb usb1-port1: attempt power cycle [ 1142.492530][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1142.732258][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000180)='net/netstat\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e24, @multicast1}], 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x7d, &(0x7f0000000040)=@assoc_value={r3}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=r3, @ANYBLOB="21000000c02f66697edaffd1917bb1bf57dcf93dd54722fff36aa48e2cedb20000884e84258d960e2e35e67d1dc1491cf84588ecfed6602284f5594fc2c711b716b8aae4d7e71ef3e14a615d9086e1d038ee6570abe95b27161e1428c3e0f46a23b3db50595823627a0e371c59a008746fdc0866bffc1b2b3df93eca8cf0c9047f9b5c1f38999e3340f93af761e8af5e0c75c79c4863fbce2e182c3e034a4e43f059617efda89ba4040fb788b496ddd1395a640d04d1c9b7976ad246c44759738e2b194e920831980024d0f57758a403753ca7d161ef4f490a8adf1d58369abbd29c96166d4ae29efce107977456d9eda59d9309fa6adeee57cc79d96222714a7a7e4e2af69ac5fc7f50157ffb40b58284997fb9aa0f0501556408dbcb51251e112b5f341c63cd92e76c203a132d2c90f08bf7f90c13c6ba0000000000000000"], &(0x7f0000000040)=0x29) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 21:36:23 executing program 5: 21:36:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x588}]}, 0x1c}}, 0x0) 21:36:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00520100000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:23 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x90040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_usb_connect(0x0, 0x34, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRES16=r1, @ANYRESDEC], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x80c, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$6lowpan_control(r3, &(0x7f0000000000)='connect aa:aa:aa:aa:aa:10 0', 0x1b) [ 1142.962153][ T1340] usb 1-1: new high-speed USB device number 75 using dummy_hcd 21:36:23 executing program 5: 21:36:23 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:23 executing program 5: 21:36:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000300000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:23 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1143.062441][T20777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1143.101482][T20785] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:23 executing program 5: [ 1143.442177][ T1340] usb 1-1: device not accepting address 75, error -71 [ 1143.772326][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1143.780484][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x5ac}]}, 0x1c}}, 0x0) 21:36:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000500000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:24 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:24 executing program 5: 21:36:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000080)={r4, 0x1f}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x81000000}}]}]}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x214, 0x13, 0x10, 0x70bd25, 0x25dfdbfd, {0x21, 0x1, 0x58, 0x1f, {0x4e20, 0x4e23, [0x80000000, 0x7, 0x4, 0x3], [0x5, 0x4, 0x9, 0x1f], r7, [0xb3, 0x100]}, 0x4, 0xae}, [@INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a3126f21e5194fbf7701f9e9da533c30437e40334e01d79850e6e129996341c6bf129d83e5e58c6b0abc62bad0374bdab896abac0309a83d61aa4bafb423cb10a6361013e8"}, @INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "c86c35214b89775b9d85a447af2b6cba039e05607aba5c4447f9fee3f049b796cd6d60508caf3743c20af23bc07d27dafbf08217e4e6eaf7e02ee8f29b530be3315a7d6aa4e07b161bd77cef33c92edc82f81c77b5698935198f52c825846ab6e3bb7809f6b46384959b4fe4915b510b22d03ac1f94785d75273ce4800d9b6b0e79a517d6598bc8398a51a142d5646d9e93ca881a2f0dfc13848898014"}, @INET_DIAG_REQ_BYTECODE={0xd6, 0x1, "d82877b4a1840652fa7bf2113ae817b37e5cccb11771148667d230365177c8685e76250d951a7c474500c0dbe9a456c3bf5c5c98b1b913bc93fd204dd9f342861111f92b70214af80f724a13c048a8b8aa17e9f45c5f0b377a015424e36a4bc422200933e221e5ca1ebe2f35949bee042e7e62d728617a4a26affdf0316173996fde3e493d081f0c2cc172dcf102991da6b30bade54230f8af3962b995d8e54de2a692dceb12604abd055a545e063234441d04d28ad29e565f6a2b77267e6b1bcb300a45f606e921868bd7ea24d24f517f99"}]}, 0x214}, 0x1, 0x0, 0x0, 0x4004000}, 0x800) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000440)) [ 1143.822204][ T1340] usb 1-1: new high-speed USB device number 76 using dummy_hcd [ 1143.884074][T20812] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1143.925503][T20815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1143.971943][T20814] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1144.029089][ T1340] usb 1-1: device descriptor read/8, error -61 [ 1144.322202][ T1340] usb 1-1: device descriptor read/8, error -61 [ 1144.422472][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1144.442184][ T1340] usb usb1-port1: unable to enumerate USB device [ 1144.812290][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:26 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="640000010402220001000000000904000000000a000000002000000000"], 0x0) 21:36:26 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:26 executing program 5: 21:36:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000900000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x5d4}]}, 0x1c}}, 0x0) 21:36:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:36:26 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:26 executing program 5: [ 1146.079367][T20836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:26 executing program 5: 21:36:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000f00000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x5fc}]}, 0x1c}}, 0x0) [ 1146.122817][T20841] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:26 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1146.216371][T20850] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1146.230296][T20852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1146.502183][ T9102] usb 1-1: new high-speed USB device number 77 using dummy_hcd [ 1146.772234][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1146.892318][ T9313] net_ratelimit: 4 callbacks suppressed [ 1146.892322][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1146.972552][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1146.980683][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1147.192177][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1147.462174][ T9102] usb 1-1: new high-speed USB device number 78 using dummy_hcd [ 1147.732193][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1147.942421][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1148.092219][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1148.122176][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1148.242223][ T9102] usb usb1-port1: attempt power cycle [ 1148.253543][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1148.962155][ T9102] usb 1-1: new high-speed USB device number 79 using dummy_hcd [ 1148.972727][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:29 executing program 5: 21:36:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$tipc(0x1e, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r5) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x3c8, 0x2e, 0x1, 0x70bd28, 0x25dfdbfd, {0x12}, [@nested={0x1a3, 0x3, 0x0, 0x1, [@typed={0x8, 0x74, 0x0, 0x0, @fd=r3}, @generic="ff7e1278872867f975dd4bc39a2f7ad664bc14010170b6078420cdb205a10371dcfa691a876e3e994be86b35aab735fcc1a62ccd2ada14aa102118f5fcdd52620ae8a14bdcf21810d7e339a882924e0e7dda51ec592d6878327a3e248df0a6a61d27f7a938fc52adb60dcf483233fb83cb1135640504eb03a615fb9a71366caeaab4a26e5e6c9e121486307c95f330258c665389606be2577dcc5580ffba062439902ab926393b9e71b4e10018d650f0c5be198ac98651f4276c73d524d4a146fcbfa3e6c5ef0c0085", @typed={0x8, 0x56, 0x0, 0x0, @uid=r5}, @generic="88958631a6814420968ab15cf917b9d42a623d20318a273e21a25727805435823dcd8489e9510bbc85270efb0d9334c7c44a125233460b4f2b19deae88aebab8a521d79a51741537db131f7503e7288234f987050c56aa4fc7f81f33da6c3f4a2191a2f1304b16763242eed5ca56f276ab16cd5846d958af37ed06d01ac0524ddbbdf24d22ab9527844f2f401299e21f949aaa456e8df9170fe955f626b09d421a5c286692f11d9f2bcc7402ca453714b8da442edd92b7a062be849a755bc9a246ac2bc6a7b9"]}, @generic="3d1d91f2d1c199e25fb0447fdff9f91f74d21d1c1e1e6610bd96ffce17de0617f68b6f712e79ee045a4c2f4f3dfb7b8fecd1c5f33a08e0c0b7bd86115736042ed9eafdb8aa26e1e418b60372d1021160372bd7921b6dd5ef13983cf6870ca661c403e35a85239d1729a1f478e0aa3f0a091587771bd32b89a266703e7fe33154a35e2a75a8719f4c315183ded02d709f38f09e96787b155ac03f62f3a2bf13a506c2d177b88903376fa5f9d015ac44e4f9807e550171af4bd6fb767eb02cf6f577f73329d4e938ba751c704f48d6d68fafcdc522ddf5b498a6d9f464", @nested={0x133, 0x54, 0x0, 0x1, [@typed={0x8, 0x50, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x32}}, @generic="0752599d010d7e7d901928af29311e84bfcdebcb32c86370dedae2c6a5f99d08b5db9d7d959756e6539c0ae9da2ce7f51c822e53edc0666325a8e9d9962a5b1b8e17b43c419f349b8342486bbee3979db45aa7d80c8d2589b163cb077a5fbc4636df8f75c70eae6fe61f0977cefa23b0522177", @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@remote}, @generic="db1756bd8e790e804cb573388324b20b2ea245ce76711a68828a6ab7f2c5c9f8b59c47e5e77d8396fae694fa3c450f443c13ed887a617ff723a852772e48439f13c4e292e14ba1978fdb7ea432b0d94aab848a2f8a534c62684bd976d74ffa1c64fac0ee5129bc5cb963f1751da9042abc72bf29f6e40504acaa74e743cff892b487f9ebe12afd62905f8ec7a4a778beffcc9f3cae4f3479615e9658af0a60cc72a9df6bd3f9d68f4f932f65"]}]}, 0x3c8}, 0x1, 0x0, 0x0, 0x4004000}, 0x10e1d8e9fb13d9a5) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x620}]}, 0x1c}}, 0x0) 21:36:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00001400000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:29 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x101000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_usb_connect(0x1, 0x34, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000040)={r2, r3+60000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x4) 21:36:29 executing program 5: [ 1149.112727][ T9102] usb 1-1: device descriptor read/8, error -71 [ 1149.130855][T20875] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:29 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1149.163789][T20880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00003400000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x644}]}, 0x1c}}, 0x0) 21:36:29 executing program 5: 21:36:29 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x4400, 0x2c40000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1149.295062][T20896] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1149.332176][ T9102] usb 1-1: device descriptor read/8, error -71 21:36:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00004800000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:29 executing program 5: [ 1149.339367][T20901] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:29 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x668}]}, 0x1c}}, 0x0) [ 1149.454319][T20911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1149.478731][T20915] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1149.542734][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1149.852242][ T9102] usb 1-1: new low-speed USB device number 80 using dummy_hcd [ 1150.012653][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1150.032180][ T9102] usb 1-1: device descriptor read/8, error -61 [ 1150.312196][ T9102] usb 1-1: device descriptor read/8, error -61 [ 1150.432302][ T9102] usb usb1-port1: unable to enumerate USB device [ 1150.732633][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1152.092293][ T1340] net_ratelimit: 3 callbacks suppressed [ 1152.092300][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYRES64=r0], 0x0) 21:36:32 executing program 5: 21:36:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00015200000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:32 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x68c}]}, 0x1c}}, 0x0) 21:36:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x3f, 0x0, 0x0, 0x7f, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext, 0xc02}, r1, 0x5, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:32 executing program 5: 21:36:32 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1152.208085][T20934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1152.240138][T20940] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00006000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:32 executing program 5: 21:36:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x690}]}, 0x1c}}, 0x0) 21:36:32 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1152.375820][T20952] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1152.405749][T20956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1152.632159][ T9102] usb 1-1: new high-speed USB device number 81 using dummy_hcd [ 1152.733231][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1152.741331][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1152.942156][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1153.132472][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1153.342164][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1153.382310][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1153.612215][ T9102] usb 1-1: new high-speed USB device number 82 using dummy_hcd [ 1153.892166][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1154.012976][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1154.172298][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1154.183577][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1154.292163][ T9102] usb 1-1: device descriptor read/64, error 18 [ 1154.412200][ T9102] usb usb1-port1: attempt power cycle [ 1155.122176][ T9102] usb 1-1: new high-speed USB device number 83 using dummy_hcd 21:36:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00006800000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x6a4}]}, 0x1c}}, 0x0) 21:36:35 executing program 5: 21:36:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000000)=0xe71, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f00000a6000/0x4000)=nil, 0x4000, 0x1000001, 0x28011, r2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x6) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_CPUID2(r5, 0x4008ae90, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000080000001"]) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000040)={0x8, 0x8001, 0x800}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:35 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:35 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_buf(r0, 0x29, 0xcd, &(0x7f0000000000)="d25ad877c10037f3f781f603ddacdabd14735526eb72dbef31221ffa655746983a2cb5387b181d8da3d5c60846d7feb7caabf448f2131e4a361d0245cf374e7891cb5f8125139d9f0a3d67570d92cdf7376077f40fc477c2b3cd104ba770bea9549961e5e25290e5c2d272c99686d61b7444aeaaa13a3088cbbdc574c79dddd9d8c64ebde8820e5afceb833d35119e1842d9a9291ab3f36cd38a727526828e10e73244cc5f2258c3e9086e0500709ee3be35df3b1e27bcd965a963e274d4f78cacb10e23c4c09a2e22beeed7d901fc070a9ee52fc1d063b5f250b38a577216b6f9c5b71c58", 0xe5) [ 1155.222351][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1155.237568][T20969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1155.252150][ T9102] usb 1-1: device descriptor read/8, error -71 21:36:35 executing program 5: 21:36:35 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1155.284246][T20976] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1155.294281][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00004003000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x6bc}]}, 0x1c}}, 0x0) 21:36:35 executing program 5: 21:36:35 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000340000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1155.425492][T20990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1155.462166][ T9102] usb 1-1: device descriptor read/8, error -71 [ 1155.481553][T20996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1155.952206][ T9102] usb 1-1: new high-speed USB device number 84 using dummy_hcd [ 1156.162505][ T9102] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1156.252375][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1156.261394][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1156.270228][ T9102] usb 1-1: Manufacturer: syz [ 1156.277383][ T9102] usb 1-1: config 0 descriptor?? [ 1156.325494][ T9102] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1156.524396][ T9102] usb 1-1: USB disconnect, device number 84 [ 1157.222319][ T5057] net_ratelimit: 3 callbacks suppressed [ 1157.222324][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1157.292393][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1157.300596][ T9313] usb 1-1: new high-speed USB device number 85 using dummy_hcd [ 1157.662175][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1157.752609][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1157.761656][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1157.770115][ T9313] usb 1-1: Manufacturer: syz [ 1157.775779][ T9313] usb 1-1: config 0 descriptor?? [ 1157.815429][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1157.852590][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1157.860705][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:38 executing program 5: 21:36:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x6d8}]}, 0x1c}}, 0x0) 21:36:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000010000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:38 executing program 0: syz_usb_connect(0x6, 0x34, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f8fbe0579b3bfebff2b7d5fe8120100051c00f5", @ANYRES64], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RFLUSH(r3, &(0x7f0000000000)={0x7, 0x6d, 0x2}, 0x7) 21:36:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffe, 0x0, 0xffffffff}, 0x1c) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) mbind(&(0x7f00009fc000/0xb000)=nil, 0xb000, 0x2, 0x0, 0xfffffffffffffffd, 0x10000000002) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) [ 1158.013442][ T9313] usb 1-1: USB disconnect, device number 85 21:36:38 executing program 5: 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x6f0}]}, 0x1c}}, 0x0) 21:36:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000020000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1158.073420][T21045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.101476][T21050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:38 executing program 5: 21:36:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000030000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x704}]}, 0x1c}}, 0x0) [ 1158.178173][T21057] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.201040][T21059] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:38 executing program 5: 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1158.285133][T21068] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.306199][T21072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.332250][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:38 executing program 5: 21:36:38 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r3}, 0x8) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f00000000c0)=""/129, &(0x7f0000000180)=0x81) 21:36:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000040000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:38 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x4201, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0xc0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x0], 0x0, 0x9, 0xbbbbbbbb}) 21:36:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x71c}]}, 0x1c}}, 0x0) 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:38 executing program 5: 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 21:36:38 executing program 5: 21:36:38 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000050000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1158.659797][T21098] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:38 executing program 5: 21:36:38 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) [ 1158.714388][T21104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.922196][ T9102] usb 1-1: new high-speed USB device number 86 using dummy_hcd [ 1159.062589][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1159.322261][ T9102] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1159.372576][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1159.422226][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1159.431291][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1159.440335][ T9102] usb 1-1: Manufacturer: syz [ 1159.447185][ T9102] usb 1-1: config 0 descriptor?? [ 1159.506443][ T9102] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1159.707015][ T9109] usb 1-1: USB disconnect, device number 86 [ 1160.253162][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1160.412982][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1160.421717][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1160.482174][T11264] usb 1-1: new high-speed USB device number 87 using dummy_hcd [ 1160.842662][T11264] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1160.932214][T11264] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1160.941319][T11264] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1160.950109][T11264] usb 1-1: Manufacturer: syz [ 1160.955657][T11264] usb 1-1: config 0 descriptor?? [ 1160.995448][T11264] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:36:41 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000000000)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904fe48e19b44c5ad3ca5897e3b32059b44b021a252fefe53a63a0b41069e70392e"], 0x0) 21:36:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x734}]}, 0x1c}}, 0x0) 21:36:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000080000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x10000000002) 21:36:41 executing program 5: 21:36:41 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, 0x0) [ 1161.202378][ T9102] usb 1-1: USB disconnect, device number 87 21:36:41 executing program 5: 21:36:41 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, 0x0) [ 1161.253587][T21157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000090000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1161.310998][T21163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:41 executing program 5: 21:36:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x74c}]}, 0x1c}}, 0x0) 21:36:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000f0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1161.663996][ T9102] usb 1-1: new high-speed USB device number 88 using dummy_hcd [ 1162.022214][ T9102] usb 1-1: config 0 has an invalid interface number: 254 but max is 0 [ 1162.030383][ T9102] usb 1-1: config 0 has an invalid descriptor of length 60, skipping remainder of the config [ 1162.040846][ T9102] usb 1-1: config 0 has no interface number 0 [ 1162.047033][ T9102] usb 1-1: too many endpoints for config 0 interface 254 altsetting 72: 225, using maximum allowed: 30 [ 1162.058148][ T9102] usb 1-1: config 0 interface 254 altsetting 72 has 0 endpoint descriptors, different from the interface descriptor's value: 225 [ 1162.071536][ T9102] usb 1-1: config 0 interface 254 has no altsetting 0 [ 1162.152215][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1162.161309][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1162.170697][ T9102] usb 1-1: Manufacturer: syz [ 1162.177535][ T9102] usb 1-1: config 0 descriptor?? [ 1162.483836][ T9102] iowarrior 1-1:0.254: no interrupt-in endpoint found [ 1162.493205][ T9102] usb 1-1: USB disconnect, device number 88 [ 1162.500669][T11264] net_ratelimit: 5 callbacks suppressed [ 1162.500675][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1163.192197][ T1340] usb 1-1: new high-speed USB device number 89 using dummy_hcd [ 1163.302725][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1163.532557][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1163.552510][ T1340] usb 1-1: config 0 has an invalid interface number: 254 but max is 0 [ 1163.560746][ T1340] usb 1-1: config 0 has an invalid descriptor of length 60, skipping remainder of the config [ 1163.570945][ T1340] usb 1-1: config 0 has no interface number 0 [ 1163.577044][ T1340] usb 1-1: too many endpoints for config 0 interface 254 altsetting 72: 225, using maximum allowed: 30 [ 1163.588101][ T1340] usb 1-1: config 0 interface 254 altsetting 72 has 0 endpoint descriptors, different from the interface descriptor's value: 225 [ 1163.601404][ T1340] usb 1-1: config 0 interface 254 has no altsetting 0 [ 1163.612693][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1163.620774][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1163.682204][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1163.691274][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1163.700076][ T1340] usb 1-1: Manufacturer: syz [ 1163.705911][ T1340] usb 1-1: config 0 descriptor?? 21:36:44 executing program 5: 21:36:44 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x26) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) fstatfs(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x6, 'veth0_vlan\x00', {0xfffffe83}}) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)={0x21c, 0x14, 0x10, 0x0, 0x25dfdbff, {0x27, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x7b, 0x1, "958dfaf0316049e87acea3642db773c2c673a53900ce966312011cfe693893f0641145ac5a8c8f21b5ae9f5f6971a644f1f10c01e2702e914a74674e7a031b8782bcd5d8942553a980b56c1e586ad30a3e1fb94bd4cbb084a8d3053e04027e36ec2648f6e0d8545c4d1bd2c3c1993f2475e1007c46da63"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "882b3c939e5733833192ff5fd8126a56373e61d74f0e74a29cb178954bc9b1868fe596581e24c00b47cf7d5d97e6dd103efb4fcb243404b05b842d758cc34f64b0867b2737ce6eeeb4b66884708e2b2f2cc30121e12818a6102953daab58619de40611adf612602dd2464b76d8589cee04e45158adfe19dfb347e5bcc7b51baf597682fac23d06bd3084ec970e5ceec13a0a1c7e03a3a6d208713607e41b03106a39303c3659718f05edd45136a3e86b61a024ddb8c0eb45813f9cfaebb998abd6b9994006f7b401bdbe52b1602d38c7ad4d1d31416e439aedd5c0447f3b08777bd068465f24e33052c8"}, @INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "7a11a54e8f11c0208cded128ddf7e95b47400cc268df8161456168b3d9d56b392a02b146040d24928c6db663c5da704fe507cc8b3fc36da7153230d360715a530c41167dee424b73408a7c683e2e8f6b6741321ea5be6e267824bd07bc7bd094e7517d4fb1d40fdadd1fa5cc71f362ff8f9ecb33942c15ea7b9dd05a68ba1a2940501de6e435ea4470d5389176a3b1a892d7cd02494612"}]}, 0x21c}, 0x1, 0x0, 0x0, 0x801}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x10000) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, 0x0) 21:36:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x760}]}, 0x1c}}, 0x0) 21:36:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000140000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xc0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r2}, 0xc) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x5, r2}, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x2, r3}, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r4, 0xfff, 0x30}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:44 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000000)={@fixed={[], 0x11}, 0x3f, 0x7, 0x2, 0x81, 0x5, "c319302749ec451bc41b10edd55bdbd3010638ea21fdfccb2f8e8d384e9348a30517355bf2ab393d523ce8091482a045527d1fc8fc12bda571fd2d6e582580b79fd166d924aebe029245bba87fd9d66ab08769591cf5bae86b8711a47925409a98bc4bc19027555dd8eda82494ca5ea94bf6623ec3f7a3deb550a58866ab3202"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7fff, @rand_addr=' \x01\x00', 0x5}, {0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, r5, 0x7ff}}, 0x48) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r6, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "633bf7adf7f0b1e500fe807d64"}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040010}, 0x4000000) [ 1163.971997][T21204] __nla_validate_parse: 2 callbacks suppressed [ 1163.972053][T21204] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1163.984068][ T1340] iowarrior 1-1:0.254: no interrupt-in endpoint found 21:36:44 executing program 5: 21:36:44 executing program 3: [ 1164.019114][ T1340] usb 1-1: USB disconnect, device number 89 [ 1164.052892][T21220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) syz_usb_connect(0x0, 0x34, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0, @ANYRES32=r1, @ANYRES16], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000005200040028bd7000ffdbdf2500000000405eb73acda96fc51159b3ede7893b33b78f0dc5369011388b8359d3719b82a57c232502520d205d0b3e256422ee5e06a50957938ed5a8a5a22a077d816ec4710f33c9f570ff31d469bd89f7f9df0ebd1f4e6bb6d81e625b7074cef408dd034a04972c80e2b78a21c895e43fa3e2a3fd6203353574999dd432f7f5583b24767919a8b7f897f893ccdc588a7ec7a14d367ba2c6524a89010768db0ba49698bbfe363b3cd05e2fcd4a7d79f7128ea2b7fc125158769b052a42917645cbbc"], 0x14}, 0x1, 0x0, 0x0, 0x20040000}, 0x40000d0) [ 1164.092592][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1e9242, 0x180) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300)=0x800000453b, 0xfffffffffffffe50) ftruncate(r1, 0x17ff) syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 21:36:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x764}]}, 0x1c}}, 0x0) 21:36:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000340000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000000)="260f089a4900a380a1003e13acf9030000000f300f3566ba420066b801e866eff20f23c80f350f1a485e66b818010f00d0", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:36:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x101) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000480000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1164.197742][T21234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1164.229757][T21244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) 21:36:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x778}]}, 0x1c}}, 0x0) 21:36:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000001520000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000100)='6', 0x1, 0x4040001, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}}], 0x1, 0x1, 0x0) [ 1164.378810][T21261] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1164.415621][T21266] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) [ 1164.435014][T21271] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1164.492199][ T1340] usb 1-1: new high-speed USB device number 90 using dummy_hcd [ 1164.572329][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1164.782191][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1165.172166][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1165.442255][ T1340] usb 1-1: new high-speed USB device number 91 using dummy_hcd [ 1165.612877][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1165.712178][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1166.142178][ T1340] usb 1-1: device descriptor read/64, error 18 [ 1166.272187][ T1340] usb usb1-port1: attempt power cycle [ 1166.332264][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1166.992204][ T1340] usb 1-1: new high-speed USB device number 92 using dummy_hcd 21:36:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa1515a4f7eb9b1dd}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x18, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x44) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:36:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000600000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x78c}]}, 0x1c}}, 0x0) 21:36:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8a041, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) 21:36:47 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[], 0x6) 21:36:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000680000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1167.152183][ T1340] usb 1-1: device descriptor read/8, error -71 [ 1167.178353][T21305] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x7a0}]}, 0x1c}}, 0x0) [ 1167.258281][T21314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) 21:36:47 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"/926], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 1167.369172][T21322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1167.379779][ T1340] usb 1-1: device descriptor read/8, error -71 21:36:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00ffffff9e0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1167.425475][T21327] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1167.694664][ T9313] net_ratelimit: 4 callbacks suppressed [ 1167.694671][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1167.872166][ T1340] usb 1-1: new high-speed USB device number 93 using dummy_hcd [ 1168.122233][ T1340] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1168.232574][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1168.241979][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1168.250423][ T1340] usb 1-1: Manufacturer: syz [ 1168.257124][ T1340] usb 1-1: config 0 descriptor?? [ 1168.313803][ T1340] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1168.516130][ T9102] usb 1-1: USB disconnect, device number 93 [ 1168.652653][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1168.732430][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1169.312325][ T1340] usb 1-1: new high-speed USB device number 94 using dummy_hcd [ 1169.372438][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1169.372987][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1169.702285][ T1340] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1169.772668][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1169.792549][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1169.801675][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1169.810625][ T1340] usb 1-1: Manufacturer: syz [ 1169.818484][ T1340] usb 1-1: config 0 descriptor?? [ 1169.865724][ T1340] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1170.012352][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1170.012643][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:50 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000000000)=ANY=[@ANYBLOB="120100001c00f540628d094514aa720000010902220001000000000904e5a200a6ee4f399c545825dcb87d266e05333786512714db8220b71aea7600e9181b678f4da5d9be043d3f2f8f2a9aafc1a0d34b195095c2267d3d1a1d036eb835b86f811287483d454f91c9e48f890e73c355fb76b0e0b8fca2eb"], 0x0) 21:36:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00ffffffef0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x7b8}]}, 0x1c}}, 0x0) 21:36:50 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x6ec, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r1, 0x703, 0x0, 0x0, {0x4}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x400c01) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x3, 0x1, 0xfffb, 0xfffc, 0x400000000}, 0x20) r6 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r5, r6, &(0x7f00000001c0)=0x202, 0x4000000000dc) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40400240}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea456bf2dac2a47afad2eb000001", @ANYRES16=r7, @ANYBLOB="080029bd7000ffdbdf25020000000c000300f400000000000000"], 0x20}}, 0x240000d0) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="040025bd7000fcdbdf250500000008000100000000000c00080007000000000000000c00040003000000000000030c000200ffff0000000000000c00050000010000000000000c0008000000008000000000097589cc501db826b3771591322f099c2b0b7a4ed52f107c048a37dc61103a71a33ab2d902ca7126a1685b39bad7146dd330e40d70edd6162aec58786b40e3bccdf273bf972b0a45c545c04718243f7ba9ae1430ae94986fda5a3b500e89fe58ce2d230c171162158a1aeb2614615f78310418208b81a1fde630227b2f8ae257f4676bac7b56cf03780b2615e57c0eeb070c0be0cd6001da7ec9e3f940dea4fab4332721641293eea8f6fd928705a2ed2c95e8d5a91080d3a17538970593961d219260c527ad5485317141a234e09b27647cbcea399df2ae1e7fb3e98097deb0f650ca6d05a424a452"], 0x58}, 0x1, 0x0, 0x0, 0x88c0}, 0x44) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="008e37e3", @ANYRES16=r7, @ANYBLOB="10002dbd7000fddbdf25030000000c00080006000000000000000c00040000010000000000000c00050028010000000000000c000800ff07000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x34}, 0x1, 0x0, 0x0, 0xdb3a7f2aaff8d161}, 0x40080) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, r7, 0x4, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xaac}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffffffff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 21:36:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e20, @rand_addr=0x64010100}, 0x0, 0x1, 0x1, 0x3}}, 0x26) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r5, 0xc040563e, &(0x7f0000000080)={0x0, 0x0, 0x102, 0x2, {0x2, 0xfffffe00, 0x8, 0x2a0c35d8}}) [ 1170.063069][ T9109] usb 1-1: USB disconnect, device number 94 21:36:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00fffffff00000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1170.120186][T21383] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1170.148055][T21390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x7d4}]}, 0x1c}}, 0x0) 21:36:50 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/vmstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x4, 0x10}, 0xc) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f0000000240)={0x0, 0x0, [0x0, 0xfffffff7, 0x6, 0x1ff, 0x10000, 0x800, 0x400, 0x1]}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(r0, &(0x7f00000017c0), 0x1b8, 0x0, 0x0) 21:36:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a007fffffff0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1170.328522][T21402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80108906, 0x0) [ 1170.394663][T21410] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1170.542400][ T9109] usb 1-1: new high-speed USB device number 95 using dummy_hcd [ 1170.654461][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1170.812445][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1170.952191][ T9109] usb 1-1: config 0 has an invalid interface number: 229 but max is 0 [ 1170.960473][ T9109] usb 1-1: config 0 has an invalid descriptor of length 156, skipping remainder of the config [ 1170.992162][ T9109] usb 1-1: config 0 has no interface number 0 [ 1170.998501][ T9109] usb 1-1: config 0 interface 229 has no altsetting 0 [ 1171.102236][ T9109] usb 1-1: New USB device found, idVendor=8d62, idProduct=4509, bcdDevice=aa.14 [ 1171.111388][ T9109] usb 1-1: New USB device strings: Mfr=114, Product=0, SerialNumber=0 [ 1171.132152][ T9109] usb 1-1: Manufacturer: syz [ 1171.137796][ T9109] usb 1-1: config 0 descriptor?? [ 1171.446859][ T9109] usb 1-1: USB disconnect, device number 95 [ 1172.172344][ T9313] usb 1-1: new high-speed USB device number 96 using dummy_hcd [ 1172.532336][ T9313] usb 1-1: config 0 has an invalid interface number: 229 but max is 0 [ 1172.541289][ T9313] usb 1-1: config 0 has an invalid descriptor of length 156, skipping remainder of the config [ 1172.552772][ T9313] usb 1-1: config 0 has no interface number 0 [ 1172.558957][ T9313] usb 1-1: config 0 interface 229 has no altsetting 0 [ 1172.643943][ T9313] usb 1-1: New USB device found, idVendor=8d62, idProduct=4509, bcdDevice=aa.14 [ 1172.653298][ T9313] usb 1-1: New USB device strings: Mfr=114, Product=0, SerialNumber=0 [ 1172.661451][ T9313] usb 1-1: Manufacturer: syz [ 1172.670629][ T9313] usb 1-1: config 0 descriptor?? 21:36:53 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000400)={0x98, 0x1c}) 21:36:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1172.893277][T11264] net_ratelimit: 3 callbacks suppressed [ 1172.893283][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a009effffff0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x7ec}]}, 0x1c}}, 0x0) 21:36:53 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:53 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x1, 0xf09}) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000080)) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000040)={0x1, r3}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1172.966479][ T9313] usb 1-1: USB disconnect, device number 96 [ 1172.991574][T21454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00efffffff0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1173.057954][T21468] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:53 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x804}]}, 0x1c}}, 0x0) [ 1173.213033][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1173.222669][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00f0ffffff0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:53 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) [ 1173.301205][T21480] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1173.367200][T21489] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1173.402513][ T9313] usb 1-1: new high-speed USB device number 97 using dummy_hcd [ 1173.792236][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1173.892299][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1173.901543][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1173.909922][ T9313] usb 1-1: Manufacturer: syz [ 1173.916868][ T9313] usb 1-1: config 0 descriptor?? [ 1173.942383][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1173.953897][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1174.159648][ T9313] usb 1-1: USB disconnect, device number 97 [ 1174.492599][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1174.932246][ T9109] usb 1-1: new high-speed USB device number 98 using dummy_hcd [ 1174.973223][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1175.132674][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1175.141115][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1175.292267][ T9109] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1175.382497][ T9109] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1175.391763][ T9109] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1175.400550][ T9109] usb 1-1: Manufacturer: syz [ 1175.407505][ T9109] usb 1-1: config 0 descriptor?? [ 1175.453611][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1175.463991][ T9109] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:36:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000010000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="b0000000fcffffff1ad270f7e52ed26de39459d16ce8ed2574322763b8969add4ff89715ceebce9644a5a0d8cf8ea99ce394aff9c2fd68b59635d01f2b13f6292e6c58b799040ac2c2e75eb225919805dab9d080004871d901a2126d109fceaf888e41eef491c6bb4519da5d22deaf86109b6bc088316832fbf3ae674e26d9e9d9cde8715320186de275bd4d5587be94ca4517429f04c0fd3a81fe9cb3f4facd0c84f0482b3bad24ce7174969307858c"], 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x820}]}, 0x1c}}, 0x0) 21:36:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) [ 1175.655201][ T9313] usb 1-1: USB disconnect, device number 98 21:36:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_netdev_private(r2, 0x89fa, &(0x7f0000000400)="b1b947d79d4e1ae44efd7a858e7a24f5ddb564e226249af61a92f7fbd266a0e6e51b1d89562dc1c76930734ddc49f0173308601d0708e12f9b80df0e037d9b6dd845cb26bca984091f4c05e1426e4622606d2f1b49040a0f502eea2f5615775f27c45f02cf7a5097f521d5cdec76f6135a6c58aa1aa61a9da0bdaf5bb71f4324fe2969e46c2ccbd7dca3e4c4eb4de8cd2e209bbaa6") r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='freezer.state\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg$alg(r6, &(0x7f0000003840)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000004c0)="6c5fef61a639d94575238a353ffe286dfaa95e46a9d4d1cf719889dcb5f132b9eac08de2c352985fcfd58ede6ffb58ae7285b781d9505cf3827e8bcbdd6281f91b141c871d7b002c966c4e08a8a3830b4258fac927c5c987d10088022f440d807ddf71111d30c041b868f9239b892df01515eba0538a521381a467835259e7865f6a8e61a6", 0x85}], 0x1, &(0x7f0000000580)=[@assoc={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x48, 0x6008004}, {0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)="a1b3f021bcbd23697267cf998237b7041a6565b7f111393ed149f991f57721d0d4a13a9037c5917dc343e50a0fe3ed39e68d0b87d5560eb467a5", 0x3a}, {&(0x7f0000000640)="d103ca3de10202729d704b7bd7acffb78f40d730c94e79dbcea579cc84ec1f186bfabebbf81d5cdf13aa4c0d312ab2a6eb2b51fbe2b89cd3d2a871643a912ea144897164f620bca2e0279d7e2a82961e7f4d", 0x52}, {&(0x7f00000006c0)="de1123932bfb9d504446737224efa8ac9f8b759500188276ac83fb72fa0e3e7d9748341ea51680bdf4e847c49ade187dbafdcdad758f7c4186eef23ba3817433d0d364c6e03a3da3e2bce452f918a6db93c438d630858c053464961cd58cf8e7f0278f956ea4cac669d6a54f5228a96e6da2317000c8bf8e931c418c3c1e7bea88027c264330e4c8091cf822003c3e744bb43add0cf7bf81c75480d0ae09b66a87216f32809472fdb2376ebc928fe50169eef6f28a35dff7f4a54e182c06baef11147b68d00ab3841909503ae2c10f7d2f4a917e9b3ba7b2bd8e7429e57e", 0xde}, {&(0x7f00000007c0)="10c1802d25d56df617649914ab91b5f225df37ff2103355efe1cc118cbadf7c1a8b2a45144e92decc922dafc654475e09317d3761225a4e6dce2543852d8a5320bea65f6a6515cbc21a785a83a0c67ea91f192644eeb528c6680d0a14fd04a36a4be5b9038e115a1", 0x68}, {&(0x7f0000000840)="19137dcce243591c47b98b9996643a6f1ed77a27d5aed8555e4d008d31cbd1e4257d307cf3327f8a5e9569934e3bd62d51826db6efea82a3821ef880d04b843ab0d7a7a8db9d1767c697bb36dc8bc15fa5539625fbaa1ec93fb2912209ed4856e83b980ae0dadb842f3a2cdd23ded7a4b9b98f15669fa77bcf77bd81f306c87953", 0x81}], 0x5, 0x0, 0x0, 0x44001}, {0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000980)="6c85a144b20695faba1f483ea0d652fef169ba7705fb52d3fa389c3cc87bedeb66c71b95b1d01f8c56adb0fa344622f0cd1b952ca35863b22d2e92efbc62bc4c429611c3ff47dc12f44af501121e95b104d87b0e620dd3d7a41cc503be649a03c8897d812eaa09410546f007d984e5f90f6364abbfd511ef63f15cdd05d78417e40acfe009d75f5ec68319b34a44d96ee0c4ad112c3ecbf263fbc7c4275125a0df535e7b95ff700c6aff27b4bc98f832fe5f7f6ec28628bc240b787c3f", 0xbd}, {&(0x7f0000000a40)="043a9df2c1debb774c2f29ea34804e4ecbb7c686a00a1ee2e12388326f704928f90196b3c82d2acd6228fcb7980fa8438f05509d34930497cfb841ad8df316cfb60b7c9f16bd41447e7172296fff68c27cee4cf5c482b59eb024a769add256e670ef1bf2e5c28ee1b9fca18a33ba0623cb5ebcc0e4cafd264745bfc5769c172da452349e7dde3a24c2aa5edd803afdf8f4f554a037292d5b21a1b306c2924cbb8671", 0xa2}, {&(0x7f0000000b00)="fc217e69590feae3f663bc06fee87c9eefc3d5eefd0799b97dd629e23c4f2dcd99d27633d9d2f0f4d94d973c88f1abc25e10b1376bb6259eaf3a80bf3c80ceb8b2e606fecae559b6bab5748b32dfc5fc65a0c0dcb535cb72172931131400d432439f3b39f0edbcd65babb12d9ed1022d31fc92", 0x73}, {&(0x7f0000000b80)="d8c38ade", 0x4}, {&(0x7f0000000bc0)="e89157842f9c135d17bbb2f9cfdf928d50d18af67fac3a1917e7393b91c63c0fd59c226f43dc3f7893dfc4f5baad8bede80761756394dba46d1d48383e1a549ef8393e1b6bf136bb048245310191134e12faca8a7b4771ce63", 0x59}, {&(0x7f0000000c40)="897de14c51c2885d1eccdff2568c97156f5aa02770d0df851e374c37df80384bf76a7d953906a7cc23e77b6adf53dc15913d2541e9d38ec6cf1cb70696d765d1e2c98422939a4dbe7b19839ff83bdfdc6da4447769f386304cffa5c6c88f52b126902e4e4cf0f39f7104fc2c6dc84434613f583b4be2dc8b8a8b23c3cea4bd50bd7efd09b30e6f06a7a506ccbd0f4f5811389478bfc0aa4433032d95cef3935b7290bcfd7edbda8c8fc2160b274f", 0xae}], 0x6, &(0x7f0000000d80)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x18}], 0x48, 0x4}, {0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000e00)="7e98224a2b67e8b8f4d343bc97bee828e0a9e51cedb0c3058ea19d96870ad21a2498435cfd4c14bfed74f28e5afb93aa02da28f558de6f6d85fb50dbf2198331ea85568df5ed85219fe37faee525661cc7878e20ca9ca8be614e7fa00e7459c98bfe885c6bd40b22d48d2632fb022c4134cf961da789185991ca926bf5ad2840e277644ae4c25f42646ed8f60912f67915e6d1c1550ea904a349ca50aa1a8682ee841920fa93a6b0322f5b90efe8b026cfbfdefd0af4e532adb29a", 0xbb}, {&(0x7f0000000ec0)="7de68552fd33dc96a30d66768c2681f375e4a58d5a7cbb66ddff85c3cce0f2af19ada94139ea3ec72ecc31c5fe571cb8fce0ca22c8b629745d7c33d8f9c24c26e112b6064b71bbdf9fe12c40eba96382a42790b0dcc2866558d574cb2eef6ec55cb92b0ddae2aedf24c8dd512c7c32d663baab7c1c73f811aa2c7a9f6ec16eed89e37b8cd1a8a192f78755bf37e2a22f2859cd0cf4996a3466180064d8395b70124e2428fcf2b5a54116dba986bebb62135203c919f34da28f10a519bf28c40f503f3bfe", 0xc4}, {&(0x7f0000000fc0)="19577b9ac3791ce8d6fa79036bd58317c3b5b5cefb844751a939664af56bf0f8a1458985dc95c2ba27b0bf8896503d0875fd86040f45edce152999fa5e85ae19c2fa7b0a13837cea91e61081d210794c5f359b484552facac66aded72bbea67b602ca58e", 0x64}, {&(0x7f0000001040)="7120fd669e9ce1abef3bf49b9575f9609675f447c3a6ae53414c382c21f129b7414a2f9520260cf217c2ac5df07c99fce2f8fa64e73bf40fc5b3fb27c90726a1802ac2db94059a6aa5c5ea4b17f9ee243b93d2cdd07b9f93058febcc6b87770870a1de92c94c87d4924df4c55ad5f1a572c8eba6f1f057200152ec5bec442070f84399f2f70a44eaa279aacfb779400dc88d7d38ea4625174062617c8597a81a2457b9521a64f4b1f0d486dd77eb9f6b356c08e4fe59f9ca719ce554994eaa6a6db7c600edd816358ca160a7d7047da43614f13bbe11f2bc111498d1142b4240effb565e69907b2d38321b8b469d7e792912", 0xf2}, {&(0x7f0000001140)="e51df43caba2990a213c5c0cc04080c5a9ec14b42565cfef58281f0df7a3eceab8bddb3e95eb27cbf106e948479bc307a2a4b847267fe6dfbb12377bbe30b5e71e59e888bacf12d37da31bf058dc9ff141b7af76a2b280eb96e8195099d86c1dcdefd931d3921c1116500bdd37739def9832c808630c1fa56549c32e51b4949915bd43b3322f20", 0x87}, {&(0x7f0000001200)="552717ef7c57cdb2dd85592861261a338f3654fdc400d2ecf3c9c6428821e3f573e32b4828b407b91e28eb8fdc1cf3591707ad3b35dfeb0c9644e75bdb9daece419b5ec5d6f1f3f363fed7b5e5b8718805db8005ea28eacacbdbcdb73c505ec338064a66f404d804405ea0253debd35306503f3b925cc2a3e0468fadb64fbf", 0x7f}, {&(0x7f0000001280)="248cd5345c6934b8f16171958e688e0646278a763199e5b5faaeeaab841ae346beb72b823bf5c6513b1cf03610ded5fe72e096218c50be7a41a289f96338fdc862ceb188f898a648be55185826786d", 0x4f}, {&(0x7f0000001300)="b4cbafe83310a24841596089593a4e007709fe79de14256f27910b76e780d17f36449deb741540902e11cf1d8b0d5ee6d4bba508d506", 0x36}], 0x8, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000013c0)="4cdd78908081f1684dbbb3baf83091c99b3c91b8b41159820f083106b6f818a4539bbfae14b7fb6393fcc9b8e640058167bf9ee338adb6b18f54410a8605b7c64913f4b5eb32a12ad9e180497473fdf46dd46d45869d6fb6906b8bc58382513b2af045a3c01daad593ee785e099255f6507493b4cd6d24a1ee2befd358098a2f2e27dad19e46fac03ff8d545cc4614638c67268716a186ef282851f738f9763c75f707daea0d301b7851ced055d04a279dba88f096cce8", 0xb7}, {&(0x7f0000001480)="62109b2b5697a5edd451eb575f399583852e22dbfc5eb8c39d597572389a817f9751dd3bea2fc6dab774004d3a1997f4be2e1c9586d8e956339b94276fe9230698493e13cef3148e908fd672639e41ba33b92ac16c196ffb531b43016c8851660c4d92654d5fb9746e644ad02370d31ae5687954e7b1d71ba323bb345d60ad572a1b6c7ad91a3faa73d11359b3fd30e47c58f9025c857926994edd4c59bb5d6918d5463873cfe1619d33870ebe53ab044fb60eac3658f5491930329c399e2eabf5259a3e714003e7b87a10a90ad3702fc64e992efb7e229125b28683", 0xdc}, {&(0x7f0000001580)="45d3554bb76fff2e5742f43f53f2e4b2612f9b5d2cfe4e41b556a8ff28f9046e7fa10d0be72d0cca7d00189e4c1ba8e0df2c869c7160b301daa6c6b35dedeea22389cb55ad512ef8", 0x48}, {&(0x7f0000001600)="07601ebdb464c5550809bd25258c2bf391f0834bf86cf3310fb2b71229a7d1743e1e20d22220cffb18ef9bc68bbad74fe5eecb8916ae9c8ef0df8c1c01a20cf664855acc12aaa15b4e0a6e4bd8988994d372612ee6ba9ab7e7b098859d4c31e4b4e9452c7d3964890241357f2214b0d36034f7524091329ed3d1baa862f2b71acfcfb5a67711231006d8020f0c72195145e190cd5bdc0a", 0x97}, {&(0x7f00000016c0)="5189f4b5f82de82e00cd9af863db669fc0d800a2caf128c75a9a28b1394c5350f54492164711e4", 0x27}, {&(0x7f0000001700)="4ec98f48c949acddd39b9dc892ae0983503d27b31dae68293e875916c5aafd8df2e6deaba061de7e815d32cd85c3ee09d3d0b3848f27a08edadbab440dad1d2ce7786855116a10de951e2590398e4f47e6065bfe4e7e45331d2d671600c10bfc9cc63d480159da54ccb2986740274599af84316a266e8741b3600cc2a64528600d9bddbe6aed3d45e09ffb82699c1fdc4ba9fc7e96383934258f0d89e10e8cf922a5e8b74d6d8981dcd0e7c50b24d368321682a29dd0344a0eb3a48646c3d2380c744b5c5f40ea29a4b50dfb1b3c58060d845fb6765337bb83", 0xd9}, {&(0x7f0000001880)="21685163e74145845a96d829a597d9b361458eae24c513d05640b900837473de4adbc58a7fa409334fafd56e6b2c65245e3de30b42669fd6803c188d3e71cf24d75001b5879ff4356053075d7357b88cb3ff482c38e80c78e911a1e1653ad8437690975e", 0x64}], 0x7, &(0x7f0000001980)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x60, 0x40004094}, {0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000001a00)="846616d7f7690480b229ae4525e32cf6f58901119a923997c004e5028975114de9e7a8023b3bec5ceccbb0ac728076086ab1aedfadc0e49f0f540c0eabd78396381d82f92c34f31c7675d67c8d9da6710ce7894e16118cc0dc", 0x59}, {&(0x7f0000001a80)="d313412d051cb143dd0509573760224635f413e45b1d6676a6ae834c250058c21505671e5d9192a6a25cb2ddfb136b85a0bab4cce2249bc47317aaeaa283302b000ad02bbf1073", 0x47}, {&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="f454c696ba275cc597e9ffa495f0fdbb45625cd7c2c7eeb07d63e0ceadb8f90372710667887ed0b9db6fb5945f058d0c99ec98640b70de27e974ef580c399558e1cb456a4f47fbc9875053cc00a3387fc33676bc0da217e7330542ca98a5e7c43c4b7ee79d599c2faadcc44bc9ed2ac9c74b2c264a66304359b935325568b0b162c5953f56e754eb89d9c0733b760b68f1c25a25ab7e3d1dc0fbb20b8505a3a783ac7be659789791c63ce13b97a0579c043c28683915d20af0485f8d3c0202fb1fdf", 0xc2}, {&(0x7f0000002c80)="0f0ac9081c2a16aa2537c80226874320db40b0894cf4dfa38b5f1882aedc2944091a84851285d7266b9102de20f70e4a1b3ecfc15ad1d4fcb9139298b6f6c7b55872f646da6b47ac4c0f08d93a6d3903719a4d2fda0c7b4863efbcc2cebe486b5db755f595d0321724aae4b2ca5bad0a6dd20f93eb5e156ba8965dc1b4ba7f80a8a42c102b73ef610336f9f8fdf1183687ae8f34b8921bb26caf5cca7dab303e8da105546b6b22ad50c5b5678cfdb8587ae6ba9a36d0d804070b3d4707d01b57739d6bff66f4c0e447", 0xc9}, {&(0x7f0000002d80)="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", 0xfc}, {&(0x7f0000002e80)="29e06cdc8c369a87dfefbf01f979a0fb76417657a2b09aba6a1b8b8005190cf3aa578c51771468f49d1b56b35dc671ea69b46133f2c092cee198f8ccc563e2f47bedc6019af377e23db16eb8549c6fe69844aedeb21e9390823294faea4db11d445f4d6bb4f42915511caa7c9639640bbd748bd02ea059df795477180a3d73ce11a34c6b48a4b8478e7317f1fe01c2498ac90a78250560b5d218bb4877f59f859a00a6d0", 0xa4}], 0x7, &(0x7f0000001800)=[@assoc={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x30, 0x4040821}, {0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002fc0)="935807bc2ec9d9f65508a065bbf8971dd9df7c2085afa58bfb6ce9c37d6ec0ccaf8133b33967513d868c0601821cfff30938c7ad886636d875efd559e45fec853163abb353de2104307398f8685aaddf503fcf73fc373decb576d6705687cadf1919bd5f083e0403227bd977676cbaadd87b2d05b271fdd4d0a02afb4b081e75375e7648327153ff6f486bf3a09f63afe5385a4f", 0x94}, {&(0x7f0000003080)="871ac192ed87354aec758b02a26cd4882944569a86520caf3353a52d8c7d2cb131376d346ec7d60f9ed1283384f15f03af82d472b81394d3202dafd2d5918dfd91a277a4ad5a375cddbbe89a3af04dcd80e5cadf764abf4ebb6580076f3f63849d0c4e05f22a229cca63bc012f59d15d4bf1b8bfb5", 0x75}], 0x2, &(0x7f0000003100)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xfffffffe}], 0x30, 0x14000044}, {0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000003140)="114fd86d5e84c2d472541cd6533c5034966033a6b913f7a720804f4613262ddffc2421cb5bc1578c14993f2c97b803d12443ed14aa36fdc6c47ef61d3782f299221aab585aa1486beda3e3e19aa57dd1e2508f", 0x53}, {&(0x7f00000031c0)="0a6727955410bf3e6507336bcd9f6abead69f841134aa0a276da82998f930d6ce979d9ad5f5569291ef91f324e9b2ec04ee786fe6fc52287c6844af214142be82134c9710215b365e5f3a9b4a01e696db767f147f2b3be3104698b774a43bfbb03fac6eb5107d13ab7e46ce306e5f18853021aedee1545fa5be7586ec211da5fa83e956b4182ab4b74464ad05e0e3b4289bf2255e9fbf61c5f67a3f67c4efd6382a9e5adde48ca80640d03b3c45babf4a14b680cda64ab1aee971953c9627b58748df07fca097bf712", 0xc9}, {&(0x7f00000032c0)="6ec10db42cdfacb413a84ed054f6b8f37a2a6bc07c502332731fa8b73eb377af3f5afe6eb36c87912d7750ebbc5aeb60a0375f5b23646ae0ad1ba8472de407bac57fbeceae6954acc7b8bb73914428389b403862270716d7925319149fad", 0x5e}, {&(0x7f0000003340)="066a7ec27043b8c67913c9325cfd2354ca74a627baa233d7eaf2283937821fc3b53e27342a523ea9618cfb985646a823e88a5c0e56cba12c2a0e0e3498df12920cd6ad433945b361dc0a73a78b6d", 0x4e}, {&(0x7f00000033c0)="7f77da5fb14d419442d17887988aa62f4549277f4e343c69b62f3cd34afa533380f3561d93428398cdccadec643599f3f2abbeb906c268c7e30570b1da84988f3b223e619a24725b6b1b5a521bb76017676d82972abbe2870aaa50e40b", 0x5d}, {&(0x7f0000003440)="81c35d5cc247f55deffa2bd47d686c43ab6ed5c39c3a62fac77ef894beeb8960f304e27403570a", 0x27}, {&(0x7f0000003480)="3fcea9c3cdffbc223096b887b70057f97bc4453a617e92b576cee9a3f3dadee9538e694a03f70290ef3ca15603290c1de5c4f00683f93c674587ef3ad5fefc05635476a97cae6bbc1114", 0x4a}], 0x7, &(0x7f0000003580)=[@iv={0x88, 0x117, 0x2, 0x70, "f91b871207387f488f5bbfa74f689ff203cbc113488da738c60697deebcdcd84e9b7316fa6a079c0261ce6a409ca06286cc7bdbc31561dcd5e605e2112631b0956c279ac9ed218667df0f0504af0cf9b23e688eb18bda0375b476485f642cad2363864ae7959aef6a685a457ca39029a"}, @op={0x18, 0x117, 0x3, 0x1}], 0xa0, 0x80}, {0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003640)="02b3c1ddc83b7710ac18026c3e8ed37ef19bb46a108b6a0a8380b2ac43ec794e61cfcbf9b66aa62d17bb707b832d7a2b8bfb4782463554954f4b80debbb5a35be158227226495730af2016839133f869a83322b3fc6f32bf942382fd4b41ab33df0c81e3746fb87fe1126e1476ace14ad15c732f608168f0d3cc181db226eab95f4eb417e1db0a8f217cf50ba0beb9bd5401d64d91c6072db2e308865f0adc30362c035d5480f0ce3fdddd2a3205e16d3102268075111f3c316ad4ad1e1c94388569eb1286a5fc", 0xc7}, {&(0x7f0000003740)="94", 0x1}, {&(0x7f0000003780)="8b5541d9e1", 0x5}], 0x3, &(0x7f0000003800)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x9, 0x20000000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = pidfd_getfd(r8, r0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000003c0)={0xfffffff, 0x0, 0x10001, r9, 0x0, &(0x7f0000000380)={0xa5, 0x4, [], @value64=0x601}}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) kexec_load(0x6, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="30c999811bb6200df7c52dc04d7ef1d3dc238373c752303790664e8cf50d6b94438ed19d8572cae5fd69ce520096eb22d6e8da416c005ee85c507ea56a8eab166a595d8eeecd6ae5c05eadd65b25aa4a9be00e6b024e06e26ce1d0a583d53199200525883669247eae314c2aafa09a14716d408368dac44275544bdb27fe3fdd56b3023b8e215df789f252e5f09e0a46a34018832fc587fcf72686d3d2cfcf2ff5104e4cd9161b7d12bcd946a1b4102c9f517d660faafa26fd6641efe874", 0xbe, 0xfffffffffffffe01, 0x5}, {&(0x7f00000000c0)="18d04644e093eb7cdc02162950592c183f40d963610133c3e616fdd2755fe685934d0bfd629dab564f2d13c32e438bf83466f69c14253495a85203cb9d614842d6d73349cab04c4ec2034bfd9d33fc60bcac54c0ea5cde34ab73ba30c51d5fd0351ed345b19aac4e08b99ac4a136eb22f421e2514d51db04bce25bdf1f44367b5ece7718dca521f29beb139b2a19e220c8e6ce13aaeb015d4c2d91406efe83e8d44e23c8254627db39ba49bbddf5a0ef8dce6fa23691cc4ff9dcd0ef28373c66447dd511b33757735983c4a78a19fc", 0xcf, 0x7fffffff, 0x6}, {&(0x7f00000001c0)="b8204edb68b10ff5e9f86f0cfe0951bddc32f2b3d0810a0c768870a4f0efc336c639d804a2ebb4a45382f7f09ea7", 0x2e, 0x4, 0x4}, {&(0x7f0000000200)="bcd6a9fb21c240b2c01be66ad2d187c395", 0x11, 0x9}], 0x160000) 21:36:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000003400000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1175.737873][T21550] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1175.759692][T21558] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x838}]}, 0x1c}}, 0x0) 21:36:55 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x850}]}, 0x1c}}, 0x0) [ 1175.916939][T21576] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1175.937804][T21579] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:56 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000100000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1176.012278][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:56 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1176.080042][T21585] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1176.149904][T21593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1176.272228][ T9313] usb 1-1: new high-speed USB device number 99 using dummy_hcd 21:36:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x868}]}, 0x1c}}, 0x0) 21:36:56 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000200000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1176.397462][T21609] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1176.418415][T21614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1176.668528][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1176.812274][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1176.821395][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1176.830263][ T9313] usb 1-1: Manufacturer: syz [ 1176.836981][ T9313] usb 1-1: config 0 descriptor?? [ 1176.883903][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1177.084097][ T9313] usb 1-1: USB disconnect, device number 99 [ 1177.872225][ T1340] usb 1-1: new high-speed USB device number 100 using dummy_hcd [ 1178.093183][T11264] net_ratelimit: 1 callbacks suppressed [ 1178.093189][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1178.232247][ T1340] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1178.322418][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1178.331601][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1178.339938][ T1340] usb 1-1: Manufacturer: syz [ 1178.342677][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1178.347460][ T1340] usb 1-1: config 0 descriptor?? [ 1178.395359][ T1340] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1178.493012][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:36:58 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:36:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000300000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x880}]}, 0x1c}}, 0x0) 21:36:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:58 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1600, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}]}, 0x28}, 0x1, 0x0, 0x0, 0xc1b287375851de9e}, 0x80014) [ 1178.593243][ T1340] usb 1-1: USB disconnect, device number 100 21:36:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000400000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:36:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x898}]}, 0x1c}}, 0x0) [ 1178.663464][T21658] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1178.681046][T21665] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:36:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x8b0}]}, 0x1c}}, 0x0) 21:36:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:36:58 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:36:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x8c8}]}, 0x1c}}, 0x0) 21:36:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000500000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1178.973817][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1179.013985][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1179.042186][ T1340] usb 1-1: new high-speed USB device number 101 using dummy_hcd [ 1179.132435][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1179.413459][ T1340] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1179.502575][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1179.511624][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1179.520251][ T1340] usb 1-1: Manufacturer: syz [ 1179.526888][ T1340] usb 1-1: config 0 descriptor?? [ 1179.564110][ T1340] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1179.612702][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1179.765261][ T9109] usb 1-1: USB disconnect, device number 101 [ 1180.172294][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1180.252740][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1180.552205][ T1340] usb 1-1: new high-speed USB device number 102 using dummy_hcd [ 1180.893309][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1180.912236][ T1340] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1181.002998][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1181.012298][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1181.020731][ T1340] usb 1-1: Manufacturer: syz [ 1181.026434][ T1340] usb 1-1: config 0 descriptor?? [ 1181.063837][ T1340] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:37:01 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0xa]}}}}], [], 0x35}) 21:37:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x8dc}]}, 0x1c}}, 0x0) 21:37:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000800000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000000)={0x2, 0x7, 0xffffffff, 0x30, 0x9, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1181.264078][ T1340] usb 1-1: USB disconnect, device number 102 21:37:01 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f00000001c0)=ANY=[@ANYBLOB="120100001c00f540c007011514aa7400001009022200011000000009049b182e3834b2f01d2ea84263e99fa5b088f62e7b3821ace8df98ff81da00794aeef2d35eb0276d64c5294b32d0f634fb89f72c5438af39d9a282a7d7fb5cd64aba8211f5f30dab5c09d0a3862bf11f40bc0da8c844eef61e7f9371144fa03bac34aff128219f2050a3374ea4498c9c0a3128d61218325be591cdf6b630add00550861a539c9f89d6329a78ab28c240e0b08858a10d30630ef1224a26c720f79f7578454f762eecfd78a59eec15a436e5e5df7b45a42bdcb80b35001241077938e285f02a8e1beae10453"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="120068e7362b09c0cad1e7b108000040341a05f740000000000509022400010000000009040000010301000009210000000122050009058103000000000021477f29b16b46b41e85610492822c6a48cd9e84393b6c722ccaeb887098c9c031b66ef20e4731aea0954b7d7c8580f8fc24ba83fef17ce1de6b25bb72506a73f912716a4653789707e5dc8ded02567970b155a109cc86a4607e"], 0x0) syz_usb_disconnect(r4) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x81000000}}]}]}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', r5}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@mcast2, r6}, 0x14) 21:37:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000900000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1181.321720][T21730] __nla_validate_parse: 6 callbacks suppressed [ 1181.321727][T21730] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1181.349807][T21741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:01 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:37:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x8e0}]}, 0x1c}}, 0x0) 21:37:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000f00000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1181.489260][T21754] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:01 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:37:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x8f4}]}, 0x1c}}, 0x0) [ 1181.560963][T21759] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000001400000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000003400000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1181.699987][T21773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1181.741819][T21777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1181.782188][ T1340] usb 1-1: new high-speed USB device number 103 using dummy_hcd 21:37:02 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1182.094142][ T1340] usb 1-1: too many configurations: 16, using maximum allowed: 8 [ 1182.172206][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.180821][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1182.191379][ T1340] usb 1-1: config 16 has no interface number 0 [ 1182.197989][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1182.222008][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1182.235356][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1182.322198][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.330536][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1182.340860][ T1340] usb 1-1: config 16 has no interface number 0 [ 1182.347072][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1182.358119][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1182.371401][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1182.452532][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.460777][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1182.471751][ T1340] usb 1-1: config 16 has no interface number 0 [ 1182.478344][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1182.489754][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1182.511202][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1182.592608][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.600901][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1182.611900][ T1340] usb 1-1: config 16 has no interface number 0 [ 1182.618412][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1182.629925][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1182.643531][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1182.722490][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.730757][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1182.741742][ T1340] usb 1-1: config 16 has no interface number 0 [ 1182.748354][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1182.759710][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1182.773437][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1182.852497][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.860732][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1182.871674][ T1340] usb 1-1: config 16 has no interface number 0 [ 1182.878181][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1182.889531][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1182.903275][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1182.982551][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1182.990823][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1183.001755][ T1340] usb 1-1: config 16 has no interface number 0 [ 1183.008286][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1183.019662][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1183.033279][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1183.112496][ T1340] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1183.120756][ T1340] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1183.131624][ T1340] usb 1-1: config 16 has no interface number 0 [ 1183.138169][ T1340] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1183.149555][ T1340] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1183.163108][ T1340] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1183.242660][ T1340] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1183.251708][ T1340] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1183.260549][ T1340] usb 1-1: Manufacturer: syz [ 1183.292480][ T9313] net_ratelimit: 3 callbacks suppressed [ 1183.292486][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1183.453368][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1183.509508][T21742] udc-core: couldn't find an available UDC or it's busy [ 1183.516478][T21742] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 1183.764032][ T1340] iowarrior 1-1:16.155: no interrupt-in endpoint found [ 1183.778321][ T1340] usb 1-1: USB disconnect, device number 103 [ 1184.092604][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1184.100700][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1184.332328][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1184.502181][ T9109] usb 1-1: new high-speed USB device number 104 using dummy_hcd [ 1184.572291][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1184.732540][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1184.782625][ T9109] usb 1-1: too many configurations: 16, using maximum allowed: 8 [ 1184.862411][ T9109] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1184.870759][ T9109] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1184.881126][ T9109] usb 1-1: config 16 has no interface number 0 [ 1184.887335][ T9109] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 [ 1184.898436][ T9109] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1184.911798][ T9109] usb 1-1: config 16 interface 155 has no altsetting 0 [ 1184.992600][ T9109] usb 1-1: config 16 has an invalid interface number: 155 but max is 0 [ 1185.000834][ T9109] usb 1-1: config 16 has an invalid descriptor of length 29, skipping remainder of the config [ 1185.012542][ T9109] usb 1-1: config 16 has no interface number 0 [ 1185.018676][ T9109] usb 1-1: too many endpoints for config 16 interface 155 altsetting 24: 46, using maximum allowed: 30 21:37:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x918}]}, 0x1c}}, 0x0) 21:37:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000004800000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xbabf}, r3, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYRES16=r1], 0x0) 21:37:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x35}) [ 1185.030609][ T9109] usb 1-1: config 16 interface 155 altsetting 24 has 0 endpoint descriptors, different from the interface descriptor's value: 46 [ 1185.061344][ T9109] usb 1-1: config 16 interface 155 has no altsetting 0 21:37:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000015200000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1185.096029][T21823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.120002][T21826] tmpfs: Unknown parameter '5' 21:37:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x93c}]}, 0x1c}}, 0x0) [ 1185.139517][T21834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.153720][ T9109] usb 1-1: unable to read config index 2 descriptor/start: -71 [ 1185.161505][ T9109] usb 1-1: can't read configurations, error -71 21:37:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x35}) [ 1185.275516][T21845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000006000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0xffffd000) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x519800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000000)={0xe, {0x1, 0x3, 0x6, 0xdd, "40735d4c4019ca6132c54cab97ca589abe8adff166e8cf2a5dd339c5372ef71a3b07d3e287845ba61f31bc46df101d3186fc392bb4a5d914178040f8f859c091472424539d88927a16e828e3696d4fcfb4577eedb0458c11e69f3ce338cc97abca9704981d75d883a64f2d6c42802b81a49140d52fcde972661b44b7aee032f411ed8c7df07066094ce34c27d04741956584d3efe1a4d0381ae732c01e200f7b03f94b27f1302aa6fd816b8cb47803f9809a8e4b936d1b263afcf87fb45ca974f58b3edbec427d0f42f17d4f7c46f6227750b952d4b5233fd05371a1f0"}}, 0xe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x108361b104bf488a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffffffffa]}, 0x8) sendto$l2tp6(r3, &(0x7f0000000200)="878420839d4d137b5420a45a95385f26765a677850a326d8e420ded8b571074467db517a679484dbe5e6cba0ca79cc36bf7706c746acde2f7b4258350aa2c1984da4b446e85dd30c593b97bf30c1d918c82ff479fc8a98e86d74d8562bed73d49fe6348732a1c38bde49e7eefe16a6614227feba718cde298c3130affda5fa082e28980d0516cd5f0e50ee2ba75a7d1cee9f25de908b4533a6793fdcd10abcc12ab4bb253387effca7bd3eec6a8a9063522caf18b44b148b4ffba294e9ed686c2d54d6ba49e191bce7a910376a63d5f0c6637e40a044d21226920142e9a2adea2d3100d9017643415f8d9796526c3fcf2316e1872ea6474a8aaa4be0fee9933daec9f5e862d871312cd5caecb9a1f770a585949f30a168d8098a4ddc4c44b0b7d75a96737a6b9d58db3f09079c7a358fdd719551562b3f39873873646713868db2365c0fc44abd77db124235757d000ed9676f1578adaa7ea42494317ebaa1ca7fb0ff1fd6cfc35d1f9c6bf29133c1555c2442dba7645d0a6bee671874fa4fd116e70113d2f2ccd721e6f2c1f622c94da6b6bb1224ed3eb0c97b9fbee0fed86acd332b37c42fc8286b7210eba7680e55dfa08c3ecc82b55c3e28e9c090fcca65932016227ecf8fcc3a2f2d97a5d67ae55d9dbbe0072d2eb98d2eeba59cef36c5d16a33b75a8776923147a27d45e2edd4db5d5ba7d683e1d0f5d7919017ecfa8b63903207c12a9ec7fee754bfd68a286f29f147052b5356c0ad72cbed630a5b4a455ba8d47083130ac96baa455f38f5e850885bbf6b4ee232101dc8e9f5f21694f05ccef40f272a39cf391b2afc633f8e1b3e98a6362c3e176f3aad233582c48892f9ea0c638c28fe9e487f2969dde11724e6284fc3fda8a77efe74216498772930ae9ea9702b3f42f1368f319241310f481daf47c0b02247197a1bfc63b8ba16f25afca370f7fa98eb603ad080b917a19ac1ac28c15c18369d44c93bd81a3dae3c1427bedf900d94a62616e8d7375e0d8c91db88ae5df91cfd6adf2b3c9fdfa80ef6abc0f6d48c3c097c5a93001a0b2464f748c4429fba1d0b7024748802a3178997838e2fc67f898d34c4fc1aa7504db712a9e652d6b6edc2a17b3dad3ef655c400ac91e7bd103d6abeaa365039fa21adc39b481842963a9dcbad94e70c22231951615d35af9042c0a7b31b5535c23aaad2e4fc9a5671b5e31b1a1a148fa1ee571027fa7fa75d6aec3a2666c52df36a0d27991baecb653289ec25cb6e1a95b871bb59a3ba615683e78806119c9a27559ac6fff5d5b065c67b649af64518cee345a42c74927e28fe595baf917964c6947e616f75501b769ebd7f92b88a2184965199e083f885b938d209375b6e99709ad37fefce223d9a79820d3f8be3260875f58da5ad7a7a351b02ef2cd64d05ed855fc908d0ae358456b8a93b3a91d885d857902e0df40bc8268f1c5ccbdc975882b815d55010e522beb177f455f9e50ce36dcd3428b6e2a2f11df0382114282354f37fe0b3be15779d6c5664462587fecb8ce17af5d08fd5c7813f48f376d4e1fe8174f838e1177f851a5138ca074fc025cbddd9a526391d6f9c38dbf0a53cffcbe09f16524dd5680bddb8288a70207738c5b5fb0a9fc1d52e9e333284036402e541cd7ac5f29d9366a0b071fb04b32e18b168ba0f1c00e93400968e965a84a6e921de4b62a0d0959738067fe5143eec598d696ed201791a15e73ca9fc966c39a87d7ae8a480a02c3736472a9bf4e6c2a04872295ffa617f8caf113ed1cc14365092a4d5655d9dc24e951deb908e081ce0df5b6c79c8a9cd70b7f379bcf4a8791f9a04b8f0690c41656b595835e61a459496dfd4b5e01e79c9e5c760cc8c57f299754956e385affe9f5bfc1b75c0f3d0324a9f40d6874b518019c6e9646131ab63c3d4a6bd948bace138a6b3d0f61aec6a95050327fe61a00dbade4e5271579d783874c32c7cdd26e0111876882e9b92c3cb8c30fd105e13d3c987ee78c36b4125fb60fe144d35fc72f94cc7199125871c36a32bb07482df530e54cbc631c6edd9ea966455658eb5cc501ab1a326fc72fef949d9ca0afd3b81d25f6d441207a8f98027841c9e67aca3020c0717172b24ab64d61ea305d62413bf3c58c7361c3b5d674868fe0f6028faf04a0883e99af77cf5be1968e3859b1caa45af65f4559c9a414ed1bd943f478aef49ac04de783fcbb97b87b0752344136ea2b4c6cf56b4191486aef7f27b97fbd6245243f294cce7261af6d15dbacb008e88d3697bae7930fb5370ef0b0ca10a2a55017b3de60a03f3f2e19ac85cb23bfd947190674e9da4806b55130d21205284af3347387e3b0b466c9d790f1ece44d04a398ab152f08543ab40ef1287fb7f292dce1400c237cd077655cfa322fc7eb2413f3eee732309912edb0cc8f408f9a5461ed216f2ecb8b6c43c8b8e82fd52052b0a57df26c8529e109c27a072081939fae9de648a3f6daf7b3223de74954ad734910a7b1a116678df9c1040983dc5c330385d7a6534edc5215784fef89529917fe163088f83195a4021b939781dd323292bc3a3e0ae2a04b021d336ae542ec6984642701721bc46a21f0751a25a7b5a993da8ad92f7fd8b3de6a8597207470d15f61e5729e55e8cfc7f546e1f09601e7a186271978e588c68cc3998d97c58fda411f523b705a507ace24ba709c21d9555ca58abade334845420353286ea0519e47bbf9e2a17b0549c4f22290dbe2a41ecbffa7e81843b258482c83a6408154513922f45ab25faa2ad33ea5b4f03342466123558daddb90e9456da6e6801c2d8f399902ab36a242d7af0b868b5620f6a7bb339f271e993dfcf0dac85b346d2a12873ad49a5af3bceae907f58dae78e969f4d223003364709a390119320ec4b198ff76a24673e1e832a77bc12b4c5e5434322085f7b8e7d62330b2bb774faf032906d3dca4cd92f5288ccbf3ae352563bceb05e6e95c28593644525de75b61ab8b36174c4e8ef5e46f33bf508816df8921699dfb94fa5da1da56463da093cb3a6cde00cb70d32d0a75d256178e0636ca2a9a8ef6d6382bf208e5c586eec1d30bf491c99ae60c6f7ba324b13b0ca82c12a6c286e546b123eca4a6dadddf50e4db214553aa8f7b2808e96738dd4db6e326a478ecf1550ae19ec8447fc470d8b01c996f67984f57f5e2463a863fc8ebb86710b3ad10e65bfb191caf4ffd736f93359a306648ce3f72c3f1fbe1f33803270006f3c736f8173b7b1237d33a1545899d0d6dd3b96530cc876e4b058059b1a929137610d5c1020f5e2bfb5053f1006cb104e9a022e28cd2c8dfe5aac9ec08e34eb1c6fd2c809ba89aa84abaa34d02d298accd82b787ffc3a65307585be1b3a794bf111dbd9f9d6b4809d783aee9dabff777379a16f3c68ff1b3e5f9ddcf7dd5fddd19083ed66383680c9315c10cc0f2a05e9ec19068e20c9614096aefac96778cafdf2c92ca55d5234a0dba485b7128fd6208a7f9739ca9f3a4a9fdbcde7552dc8ca76c7d237503ee85bcf0c6651346cd77b3cb2861bf5b6c5cfcfee05092b205693eea227672904b24599daeae794d46beccbd9fc2615134de1ed1e0d96603b20189e84e6101e1cb1c2e7f8843c967883929f821f957b1564e50dd882a5897cffe20c3616730d1a5cccbf1ec1075ef2852ac88bc1c7344d6fd3781ebba21f7046c3888d7318bcadfb9aabe060e4922f5c5ec9b978784488373b0304841b5ec4c8d8ef082eafc605def54209a5aa675408425b3543181859dff75a8beeb482ee439a7cd91cfdbacb3327691712d6e810f04b0e5bd0c7958abe4c896c3f62234af8b5475bafc914b42da6657523b0e3202c2b71b7b21b04a4467096e326f3afa4a6700044cf3c14e7459fae79e5099bfbfaa8d72ed50407f89b0ebd47eccabdd6167f6baa1508da164522273dda233aea6a722d9c02ee5ee436fe5849a56ca8be40935b1f450e65e05ebb8ecb131ce3134f7553477c9890adb22450bcd4f36e01bf1261b5d2ceae6799ace155e60ea65212f65c902b96d2317e0430bbad7c8dcffec0fcd7f08078c51864d34f55b4d678144c2814716b45fbccb9bade619355929f99d2383aeb2ff6abb46ea559ddb42f9ba614855c3b773dea8f4d47a4bf3df88b6a4fb745640dfb1995fd9a9cf57f923ddd9caa01ea2947ca8ed308d7a10bd32c601dd7648a50400e6af7bd3c6d8bae17d1e1c0daab037ae4a32c23915e2a2f123d074ab088d08441beab8481d1f227181f116f80383c3026a43c8a71c36978cd8b2cc5940d3b87c1cd6acd14fbf5c3bf0399713936d13b57dcd02106429b04e85c3c59426040938411a3de01b7fc7fdfcb13f25910ada02afd975cb26949acddc63d257ecdd779098231b60d085f467dfcc4e7d0c8847437699ae75e112efde6009983f8559a857617df1ba34150f8bcca9af8fd0694c5a60582e0e5b6f0f691b2d10f249087f6beb4b23e1bf70bd9243e1cf1ceb60193dbb98df14ae359b411a7dc2af96955d309a9ad0e4f03b2c32354f6117e79b17dce91b4b83dbb65c556c56b10c3bd9825e2756e33ed6ad06832f519964fa913877b126f7cd89b32548606da106fa1b0e26f26acd2cef8b233716d724b63c8e2af7c9c4a9a3904c035c294f82e6d3a03705790bc4f6159d359c4dce6fc8c2a97f9d44a39aa303846ee78075e493a4eeaffe2bc51f4d2ea63c7305914ef74460487041bf5cad1b15ba2efdf0fe22f6ef8f33fd8767c664d654354b5f4122985c57387c7ca1d81cbdf76c5e8a7daf0abdeca975ea6750b98fc996f139d9b715739d183cf6085874bff918b17e9e00763e6f28135d095fcc9c93f6ce4f94da8b53e3a1b0e7086328af8cbeb86f4efc07d1e9a3fbd0e74fff1356cab6d3808c1cb9bd4d83a655a8bdcd3b083202be791f73fcae1a1e1096d13347a127fdadd7b08b964de9d54cfc642fc6f02042e54817ea0be3ce9b7c9598dcacdfa9a8b374be7de9b71bd6e51910bf03e9dc125b8af70c3fc457937e68fb997fe135e3ffa199682cefe2a9893f06d2d00b9e2b34b87dd6aa664cc077517bce65dbf5ac739f43ec8cfa30ee0e252fc19750438a4c57745cb4645afa0779bc4d873c2014e901a6b9e1e977c63e73fcfc632cf807a8920640d8740f295de19768e9e7a5f59e010c2e735a66780adb8a69de4f6ac6cdffcb2eabee227ad623c84cade5d9e0a43f0b40311f0189183fe4675a706a909771b7f2f47bd4cc57e8f92d075c8af6dc4b744f15504daa56d852eee1b6d45f1305e5c5112ebb855089cdbd4907a1e1829ed25bde6cf6382c7c05d0ac62ce38fff6d03fe771991dc6fc7d21b21ae1ef6fc0a82127c78c9db02acb342db74d7c585a1a1bbe8451fccbd5544ce149294d2a43261ee928ef93274a2f47feec47e6f02b7b1bc65436d5e85fdc1d55ff5d37802f59a64e6b8d448e0104a106c639a6a36daa52138f650e0afda05308be27783078d5af547e39049d97b5cf99a08bb2fbbcb1edbf5ae53cbc44113298b0eb67d07b4b75ee2d1799dc5175f6407a6d8a8942efac2c9f2f75b52981b6ece3e0a9be1260039eed9d8f17f139826babd6c8039b1e8a742ea6694f8d1638aca5dfbbc33fde0f2b60f876946496e08965e6f895e70960e88b3ab4fb00582c85e2f0ae06387972dd5e14c3ddd549c6d5fa764fe1f8cd4183e1ba0f97f908a9d76aa263137b5ab3e19868a180ef9c09e06a7a20db679281d513a873edaf3e120ee49addf86513d759322aa7a579a28f45234be7b649b712bd0", 0x1000, 0x4004804, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xbd, 0x3}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x968}]}, 0x1c}}, 0x0) [ 1185.329299][T21851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1185.383828][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1185.393907][T21852] tmpfs: Unknown parameter '5' 21:37:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000006800000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x35}) [ 1185.543790][ T9109] usb 1-1: new high-speed USB device number 105 using dummy_hcd [ 1185.574264][T21875] tmpfs: Unknown parameter '5' [ 1185.822206][ T9109] usb 1-1: device descriptor read/64, error 18 [ 1186.212208][ T9109] usb 1-1: device descriptor read/64, error 18 [ 1186.332275][ T9109] usb usb1-port1: attempt power cycle [ 1186.412301][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1186.652618][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1187.042191][ T9109] usb 1-1: new high-speed USB device number 106 using dummy_hcd [ 1187.223461][ T9109] usb 1-1: device descriptor read/8, error -61 [ 1187.492443][ T9109] usb 1-1: device descriptor read/8, error -61 [ 1187.762221][ T9109] usb 1-1: new high-speed USB device number 107 using dummy_hcd [ 1187.932723][ T9109] usb 1-1: device descriptor read/8, error -61 21:37:08 executing program 0: ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:37:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x98c}]}, 0x1c}}, 0x0) 21:37:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$snddsp_control(&(0x7f00004fb000/0x4000)=nil, 0x1000, 0x1, 0x12, r2, 0x83000000) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000008000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [], 0x35}) 21:37:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1188.137777][T21895] __nla_validate_parse: 2 callbacks suppressed [ 1188.137784][T21895] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1188.153514][ T9109] usb 1-1: device descriptor read/8, error -71 21:37:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000ffffff9e00000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1188.210344][T21900] tmpfs: Bad value for 'mpol' 21:37:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [], 0x35}) [ 1188.270365][T21910] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1188.283503][ T9109] usb usb1-port1: unable to enumerate USB device 21:37:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x9b0}]}, 0x1c}}, 0x0) 21:37:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000000000)) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1188.402627][T21920] tmpfs: Bad value for 'mpol' [ 1188.470854][T21926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1188.492235][T11264] net_ratelimit: 2 callbacks suppressed [ 1188.492242][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1188.503566][T21932] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1188.652194][ T9109] usb 1-1: new high-speed USB device number 108 using dummy_hcd [ 1189.012220][ T9109] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1189.092284][ T9109] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1189.101379][ T9109] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1189.110981][ T9109] usb 1-1: Manufacturer: syz [ 1189.116654][ T9109] usb 1-1: config 0 descriptor?? [ 1189.153845][ T9109] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1189.212950][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1189.221074][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1189.364134][T11264] usb 1-1: USB disconnect, device number 108 [ 1189.542381][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:10 executing program 0: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_SELLOADLUT(r3, 0x541c, &(0x7f0000000000)={0x5, 0x8, 0x0, 0x1f, 0x3}) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_usb_connect(0x0, 0x34, &(0x7f0000000040)=ANY=[@ANYRES64=r1], 0x0) 21:37:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x81000000}}]}]}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x2f, 0x3, 0x1, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0xb}, 0x8000, 0x80, 0x8000, 0x4}}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:10 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [], 0x35}) 21:37:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000ffffffef00000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x9d4}]}, 0x1c}}, 0x0) [ 1189.852645][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1189.853749][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1189.862896][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000fffffff000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1189.922896][T21956] tmpfs: Bad value for 'mpol' [ 1189.936511][T21964] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1189.971805][T21968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x9f8}]}, 0x1c}}, 0x0) [ 1190.010147][T21963] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 21:37:10 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1190.090917][T21977] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000007fffffff00000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x18000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000080)={0x6, "20b485101054b830dbdc91f427385bf0fabf82d49cae598829ff41beba14837a", 0x2, 0x2, 0x2, 0x100000, 0x2, 0x2}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20041, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1190.201146][T21989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.223922][ T9109] usb 1-1: new high-speed USB device number 109 using dummy_hcd [ 1190.492497][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1190.512203][ T9109] usb 1-1: device descriptor read/64, error 18 [ 1190.572298][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1190.902176][ T9109] usb 1-1: device descriptor read/64, error 18 [ 1191.172212][ T9109] usb 1-1: new high-speed USB device number 110 using dummy_hcd [ 1191.452305][ T9109] usb 1-1: device descriptor read/64, error 18 [ 1191.862178][ T9109] usb 1-1: device descriptor read/64, error 18 [ 1191.982221][ T9109] usb usb1-port1: attempt power cycle [ 1192.692193][ T9109] usb 1-1: new high-speed USB device number 111 using dummy_hcd 21:37:13 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000ffffffff00000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:13 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x2) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000040)={0x1, 0x2, [{0x2, 0x0, 0x4}]}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:37:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="df918538f24530cccabff28225ae0737b7fe7afe2856bb318f42e1d23e039f6929049b8d74551f9e545a06342dc24aaa58466e26118cbf4c071a82b8b6c6d45f8d02c1e99501ce2282208f3c3469cba4a0dcc3fb65636e25fb4820674cacf47086af9a612f7ba2fc846a3bb5", 0x6c, 0x31b}, {&(0x7f0000000200)="ef9aca0fad931b0951650102b1d99bdaf02bf424850cc7480e8587448fb180e245fc4c1c3bcbcb319c1d4fba5311e4ea639e3e3c850df943bacd87a18395a13901e0d6ec24bbcbd9233be21e25ffe306661a45d664c2dbe0407d638175a379605d74e5f8992b778ba29fd1ada11d6a034a0ca19633471fe5c094aed28f789a54bf610891773e9ae995a0387a89b9c3ce85c6b80e5245fe8932bd846592ec1a79710f6bc5d32a991756a2fe0c40f819fc1080d13566dd95c9fc55e08ca024167a9e9bb19145369d38c7f8ec573532a50750dbf5e60c93109b9bc468292a8b576b60ae5b7c214e267b0725ca7bcdd85ae391bd207170d2c3", 0xf7, 0x7}], 0x80040, &(0x7f0000000140)={[{@noquota='noquota'}, {@nobarrier='nobarrier'}, {@discard='discard'}, {@nosuiddir='nosuiddir'}, {@lockproto_dlm='lockproto=dlm'}, {@noquota='noquota'}, {@lockproto_dlm='lockproto=dlm'}], [{@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, ':,^!'}}, {@context={'context', 0x3d, 'root'}}]}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xa24}]}, 0x1c}}, 0x0) [ 1192.882219][ T9109] usb 1-1: device descriptor read/8, error -61 21:37:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000200000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xa48}]}, 0x1c}}, 0x0) [ 1192.960652][T22012] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1192.998855][T22019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:13 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x900, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) 21:37:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xa6c}]}, 0x1c}}, 0x0) 21:37:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000300000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1193.112246][ T9109] usb 1-1: device descriptor read/8, error -71 [ 1193.199729][T22044] __nla_validate_parse: 2 callbacks suppressed [ 1193.199753][T22044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000400000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1193.278319][T22051] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1193.622255][ T9109] usb 1-1: new high-speed USB device number 112 using dummy_hcd [ 1193.692315][T11264] net_ratelimit: 4 callbacks suppressed [ 1193.692322][T11264] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1193.705990][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1193.872227][ T9109] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1193.962789][ T9109] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1193.971843][ T9109] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1193.981262][ T9109] usb 1-1: Manufacturer: syz [ 1193.987544][ T9109] usb 1-1: config 0 descriptor?? [ 1194.045622][ T9109] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1194.244182][ T9313] usb 1-1: USB disconnect, device number 112 [ 1194.732389][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1194.972569][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1194.980705][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1194.988791][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1195.012198][ T9313] usb 1-1: new high-speed USB device number 113 using dummy_hcd [ 1195.372496][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1195.462559][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1195.471753][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1195.480586][ T9313] usb 1-1: Manufacturer: syz [ 1195.486319][ T9313] usb 1-1: config 0 descriptor?? [ 1195.526084][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1195.612707][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1195.620809][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xa90}]}, 0x1c}}, 0x0) 21:37:15 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0xa]}}}}], [], 0x35}) 21:37:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000500000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={0x0, 0x1, 0xffffffffffffffff, 0xf866, 0x80000}) r1 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'virt_wifi0\x00', {0x7}, 0x800}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000340)={0x0, 'vlan0\x00', {0x2}, 0x1f}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x0, r1, 0x8}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff, 0x481}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={0x0, 0x4, 0x101}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000040)={0x0, 0x3bf7, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000000)={0x0, 0x6, 0xfffffff9}) r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x182) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r2, 0xfffffff8, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x1, 0xffffffffffffffff, 0x7fffffff, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000000)={0x0, 0x4cb, 0x8}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:15 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) r3 = dup3(r1, r2, 0x80000) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000005c0)=@req3={0x6, 0x9, 0x2, 0x5, 0x80000000, 0x1, 0x2}, 0x1c) syz_usb_connect$uac1(0x6, 0x11d, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x10b, 0x3, 0x1, 0x5, 0x10, 0x40, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0xff, 0x81}, [@mixer_unit={0xb, 0x24, 0x4, 0x2, 0xdf, "b21b5a3589ba"}, @input_terminal={0xc, 0x24, 0x2, 0x5, 0x100, 0x1, 0x6a, 0x0, 0x2, 0x9}, @input_terminal={0xc, 0x24, 0x2, 0x6, 0x206, 0x4, 0x4, 0x8c, 0x0, 0x6}, @extension_unit={0xc, 0x24, 0x8, 0x6, 0x7b, 0x7, "c956cd724d"}, @output_terminal={0x9, 0x24, 0x3, 0x6, 0x101, 0x3, 0x4, 0x6}, @feature_unit={0x9, 0x24, 0x6, 0x6, 0x5, 0x1, [0x6], 0x1}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xd, 0x24, 0x2, 0x1, 0xff, 0x4, 0x7, 0x1f, '\r2n', "d7fb"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x4, 0x3, 0x9, 0x0, "0c7f"}, @as_header={0x7, 0x24, 0x1, 0x9, 0x40, 0x2}, @format_type_i_continuous={0xe, 0x24, 0x2, 0x1, 0x83, 0x4, 0x30, 0x6, "e10b7d", '\'~F'}, @format_type_i_discrete={0xc, 0x24, 0x2, 0x1, 0x8, 0x4, 0x5, 0x7, "9af7cc8c"}, @format_type_ii_discrete={0x11, 0x24, 0x2, 0x2, 0x80, 0xfd, 0x7b, "30c93ac6d8dca266"}]}, {{0x9, 0x5, 0x1, 0x9, 0x200, 0x0, 0xc2, 0x1, {0x7, 0x25, 0x1, 0x1, 0x5, 0x1f}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x401, 0xaf9, 0x3, "dde2c5fa"}, @format_type_ii_discrete={0xe, 0x24, 0x2, 0x2, 0xfffa, 0x6, 0x7, "b706319835"}, @as_header={0x7, 0x24, 0x1, 0x5a, 0x79, 0x4}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x2f, 0x1, {0x7, 0x25, 0x1, 0x86, 0xc0, 0x9}}}}}}}]}}, &(0x7f0000000540)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x7f, 0xfb, 0x3, 0x10, 0x8}, 0x45, &(0x7f0000000180)={0x5, 0xf, 0x45, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0x2, "aceb62e019abc1b981353c7af5c4b84c"}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x80, 0x2, 0x81, 0x5, 0x8}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "037d6926827b4998e24b14d4b6a9d133"}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x1, 0x2, 0x1b98}, @ptm_cap={0x3}]}, 0x8, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x419}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x340a}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x814}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x2009}}, {0xc5, &(0x7f0000000300)=@string={0xc5, 0x3, "880bac08302a2ad9a312184e31a9f49b4dd3646c9d545cb84464f353f428a39fbcb306377e5a2933d7392895c86506cfdd409b2b3bed7aac1bae98167da10f34d90d7c0ccd6d194f4b96b21056804601080b2e61cdd9363b907c97c1ab8458902e5904975edc3312d9a7db6f8a65bac751e1522202fd304b28cabc82aaafefb81a1b97cc471f5c066f63dac290e7b2861342cd996cd03818d1b4e74703248da88a66ce3c527e0c57294d5ce80abac9053f45b0863922584e6c47eaac6f0b6bd4c548f7"}}, {0xc0, &(0x7f0000000400)=@string={0xc0, 0x3, "322d20523652795ae03095b04e026ecddda9f261da35e7c9abd0d7a68bf85da0e7d014e74cf5c2509c3abd8d4392bc868244c808c0d2f42b4fd7fbd69c0a1a5f42536b6ac7a0daba0121d2de12f4e8a203ca052e6c84d5f7002c6d66c51c7feb1ebc28e46c7233c8030c042fde8a95a77d146af7bc0de25ffc18e59f2396241252db1791ffde411db8b6f04107098eac4af7d658fbe4bc500fa73735c433903d6c29b29757fbdf52310653cccbc4eddf54db1c8ab30eaa84cbf43b678088"}}, {0x10, &(0x7f00000004c0)=@string={0x10, 0x3, "404b2f072511c912f74e9d55c2b3"}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x52}}]}) [ 1195.723081][ T5057] usb 1-1: USB disconnect, device number 113 21:37:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xab4}]}, 0x1c}}, 0x0) [ 1195.772405][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1195.779643][T22096] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.795852][T22097] tmpfs: Bad value for 'mpol' [ 1195.800018][T22103] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000800000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:16 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0xa]}}}}], [], 0x35}) 21:37:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000900000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1195.967826][T22119] tmpfs: Bad value for 'mpol' [ 1195.973261][T22121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:16 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0xa]}}}}], [], 0x35}) [ 1196.034760][T22129] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xadc}]}, 0x1c}}, 0x0) 21:37:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000f00000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xac, 0x0, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x1}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x4}, @CTA_TUPLE_ORIG={0x40, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @loopback}}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'tftp-20000\x00'}}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xff}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x200}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0xff}]}, 0xac}, 0x1, 0x0, 0x0, 0x40044}, 0xc1) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000000)={0x80000000, 0x2, 0x3, {0x5, @sliced={0xb4b4, [0xff, 0xff15, 0x6, 0x3ff, 0x742, 0xff, 0xf9c, 0x8, 0x80, 0x3, 0x9, 0x5, 0x100, 0x7, 0x80, 0x5b81, 0x6, 0x8, 0x2, 0x6, 0x6, 0x0, 0xfff, 0x259, 0xfffe, 0x100, 0x800, 0x6, 0x1, 0x1000, 0x400, 0x6, 0xfff, 0x7f, 0x253, 0x8, 0x800, 0x3, 0x1, 0x3, 0x40, 0xe4, 0x7, 0x1, 0x20, 0x4a13, 0x4, 0xff], 0x9}}}) 21:37:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xb00}]}, 0x1c}}, 0x0) [ 1196.123102][T22139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.149439][T22141] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.182221][ T5057] usb 1-1: new high-speed USB device number 114 using dummy_hcd [ 1196.203757][T22140] tmpfs: Bad value for 'mpol' [ 1196.268262][T22153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.310200][T22156] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.612645][ T5057] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1196.712585][ T5057] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1196.721610][ T5057] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1196.731279][ T5057] usb 1-1: Manufacturer: syz [ 1196.737066][ T5057] usb 1-1: config 0 descriptor?? [ 1196.742100][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1196.775300][ T5057] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1196.979508][ T9313] usb 1-1: USB disconnect, device number 114 [ 1197.762195][ T5057] usb 1-1: new high-speed USB device number 115 using dummy_hcd [ 1198.122242][ T5057] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1198.212212][ T5057] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1198.221296][ T5057] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1198.231127][ T5057] usb 1-1: Manufacturer: syz [ 1198.236749][ T5057] usb 1-1: config 0 descriptor?? [ 1198.274048][ T5057] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:37:18 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000000000)=ANY=[@ANYBLOB="120100001c00f540c007011514aa74000001090222000100000000090438d2b4695b75fe43cef5ce16219b29af655824160ad0a48f88ba4c23704de150056af98b379b9cb7e818283ae684d56508d37b823ae6667822e1a81d38d4a4a61d2915fd20de6158e27ab77e60add048626d936a0ebd856f34161746abf46ffbe12b8b328ca0649899e2531b22f337f98a8d6ee2f52eec8509984eb945ef4103"], 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/94, 0x5e) 21:37:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0, 0xa]}}}}], [], 0x35}) 21:37:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00001400000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xb24}]}, 0x1c}}, 0x0) 21:37:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x191000, 0x0) ioctl$SIOCRSGL2CALL(r5, 0x89e5, &(0x7f00000004c0)=@null) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x40000004001fe) ioctl$SNDRV_PCM_IOCTL_DROP(r2, 0x4143, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) dup(r0) [ 1198.484150][ T9313] usb 1-1: USB disconnect, device number 115 21:37:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00003400000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0, 0xa]}}}}], [], 0x35}) 21:37:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xb3c}]}, 0x1c}}, 0x0) [ 1198.551549][T22206] tmpfs: Bad value for 'mpol' [ 1198.560642][T22211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1198.583916][T22216] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00004800000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1198.695924][T22225] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00006000000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1198.747473][T22230] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1198.784205][T22236] tmpfs: Bad value for 'mpol' [ 1198.893875][ T1340] net_ratelimit: 3 callbacks suppressed [ 1198.893882][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1198.942231][ T9313] usb 1-1: new high-speed USB device number 116 using dummy_hcd [ 1199.322194][ T9313] usb 1-1: config 0 has an invalid interface number: 56 but max is 0 [ 1199.330329][ T9313] usb 1-1: config 0 has an invalid descriptor of length 67, skipping remainder of the config [ 1199.341110][ T9313] usb 1-1: config 0 has no interface number 0 [ 1199.347543][ T9313] usb 1-1: too many endpoints for config 0 interface 56 altsetting 210: 180, using maximum allowed: 30 [ 1199.358872][ T9313] usb 1-1: config 0 interface 56 altsetting 210 has 0 endpoint descriptors, different from the interface descriptor's value: 180 [ 1199.372559][ T9313] usb 1-1: config 0 interface 56 has no altsetting 0 [ 1199.452710][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1199.454511][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1199.469892][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1199.478361][ T9313] usb 1-1: Manufacturer: syz [ 1199.485119][ T9313] usb 1-1: config 0 descriptor?? [ 1199.763888][ T9313] iowarrior 1-1:0.56: no interrupt-in endpoint found [ 1199.777385][ T9313] usb 1-1: USB disconnect, device number 116 [ 1199.782398][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1199.932334][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1200.502224][ T9313] usb 1-1: new high-speed USB device number 117 using dummy_hcd [ 1200.732448][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1200.740542][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1200.748630][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1200.882234][ T9313] usb 1-1: config 0 has an invalid interface number: 56 but max is 0 [ 1200.890306][ T9313] usb 1-1: config 0 has an invalid descriptor of length 67, skipping remainder of the config [ 1200.901208][ T9313] usb 1-1: config 0 has no interface number 0 [ 1200.907802][ T9313] usb 1-1: too many endpoints for config 0 interface 56 altsetting 210: 180, using maximum allowed: 30 [ 1200.919145][ T9313] usb 1-1: config 0 interface 56 altsetting 210 has 0 endpoint descriptors, different from the interface descriptor's value: 180 [ 1200.932825][ T9313] usb 1-1: config 0 interface 56 has no altsetting 0 [ 1200.983354][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1201.022552][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1201.031659][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1201.040362][ T9313] usb 1-1: Manufacturer: syz [ 1201.047064][ T9313] usb 1-1: config 0 descriptor?? 21:37:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x1c}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0x10, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x407ff, 0x4000) bind$l2tp6(r5, &(0x7f0000000040)={0xa, 0x0, 0x558, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x3}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xb60}]}, 0x1c}}, 0x0) 21:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00006800000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) 21:37:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0, 0xa]}}}}], [], 0x35}) 21:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x7, 0x7, 0x3ff, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x800f, 0x7800, 0x200, 0x18}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'gre0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00', @ANYRES32=r2, @ANYBLOB="00207810000000010000069c401d00c000670000552990780a010101ac1e0101443cdc730a01010000000800ac1414bb0000006fe0000002000000070a01010000000002ac1e01010000001fac1e00010000ffffffffffff00007fff440c9651e00000020000000944185d4000010000000000050000000100000006000000009404000001018317d600000000ac1414aaac1e0001e0000002e0000001440c4191ac1414bb00000000070fcdac1414aa7f000001ac1414bb8313f3ac1e01010a010102ffffffffac1414aa00"]}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100e01700f540c007011514aa740000010902220001000000000904"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000200)) [ 1201.323707][ T9313] iowarrior 1-1:0.56: no interrupt-in endpoint found [ 1201.348870][ T9313] usb 1-1: USB disconnect, device number 117 21:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00005201000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1201.373543][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1201.377116][T22283] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1201.382451][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30, 0x0]}}}}], [], 0x35}) [ 1201.416107][T22290] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1201.427760][T22281] tmpfs: Bad value for 'mpol' 21:37:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xb84}]}, 0x1c}}, 0x0) 21:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000003000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:21 executing program 5: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@quiet='quiet'}]}) 21:37:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000005000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1201.567860][T22308] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1201.615662][T22317] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1201.627459][T22318] hfs: can't find a HFS filesystem on dev loop5 21:37:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xbb0}]}, 0x1c}}, 0x0) 21:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000009000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1201.708464][T22318] hfs: can't find a HFS filesystem on dev loop5 [ 1201.749523][T22331] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1201.763838][T22332] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1201.812828][ T9313] usb 1-1: new high-speed USB device number 118 using dummy_hcd [ 1202.202262][ T9313] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1202.262210][ T9313] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 1202.269810][ T9313] usb 1-1: can't read configurations, error -71 [ 1202.962173][ T9313] usb 1-1: new high-speed USB device number 119 using dummy_hcd 21:37:23 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c00701150000090400"/29], 0x0) 21:37:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xbd4}]}, 0x1c}}, 0x0) 21:37:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) sendmsg$kcm(r1, &(0x7f0000001980)={0xffffffffffffffff, 0x0, &(0x7f0000001900)}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000d00)=@xdp, 0x80, &(0x7f0000000ec0)=[{0x0}, {&(0x7f0000000e80)=""/54, 0x36}], 0x2}, 0x0) 21:37:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000f000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000680)=ANY=[@ANYBLOB="020900000080000001"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000000)={0x6, 0x4, 0x5, 0x0, 0x1, 0x5, 0x8, 0x8, 0x7f, 0x8, 0x8, 0x3f, 0x0, 0x2, 0x81, 0x0, 0x1, 0x7, 0x2, [], 0x33, 0xffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:37:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000014000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xbf8}]}, 0x1c}}, 0x0) [ 1203.323419][ T9313] usb 1-1: unable to get BOS descriptor or descriptor too short 21:37:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x35}) 21:37:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000034000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1203.382323][ T9313] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 1203.389882][ T9313] usb 1-1: can't read configurations, error -71 [ 1203.415273][ T9313] usb usb1-port1: attempt power cycle 21:37:23 executing program 5: keyctl$setperm(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) 21:37:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc18}]}, 0x1c}}, 0x0) [ 1203.533783][T22387] tmpfs: Unknown parameter '5' [ 1204.092364][T12097] net_ratelimit: 4 callbacks suppressed [ 1204.092372][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1204.122211][ T9313] usb 1-1: new high-speed USB device number 120 using dummy_hcd [ 1204.252783][ T9313] usb 1-1: no configurations [ 1204.257391][ T9313] usb 1-1: can't read configurations, error -22 [ 1204.413209][ T9313] usb 1-1: new high-speed USB device number 121 using dummy_hcd [ 1204.542275][ T9313] usb 1-1: no configurations [ 1204.546884][ T9313] usb 1-1: can't read configurations, error -22 [ 1204.562331][ T9313] usb usb1-port1: unable to enumerate USB device [ 1205.132260][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1205.852380][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1205.853220][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1206.172343][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:26 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x4d0, r0, 0x202, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_PROBE_RESP={0x436, 0x91, "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"}, @NL80211_ATTR_TX_RATES={0x5c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x20, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x8, 0x3, 0x2, 0x3, 0x2, 0x73ef, 0x8]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x1c, 0x1, [@NL80211_TXRATE_HT={0x18, 0x2, "9ebb8985c1febf1a330b0177798fbb84c89c4d99"}]}, @NL80211_BAND_5GHZ={0x1c, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0xdb4, 0x9, 0x3ff, 0x8279, 0xfff7, 0xfe, 0xef]}}, @NL80211_TXRATE_LEGACY={0x4}]}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x20, 0x2}}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x7}, @NL80211_ATTR_HIDDEN_SSID={0x8}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0x10000}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x4d0}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) fallocate(r3, 0x41, 0x5, 0x100000000) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x43, &(0x7f0000000680)={r5, r6/1000+10000}, 0x10) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f0000000600)={0x3, "827c15487d51286151064ffc013501e83dcdc9d958db86a216f86ae201a2af90", 0x2, 0x1}) 21:37:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc38}]}, 0x1c}}, 0x0) 21:37:26 executing program 5: keyctl$setperm(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) 21:37:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000048000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x35}) 21:37:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:26 executing program 5: keyctl$setperm(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) 21:37:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000152000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1206.349952][T22419] __nla_validate_parse: 6 callbacks suppressed [ 1206.349960][T22419] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1206.367592][T22421] tmpfs: Unknown parameter '5' 21:37:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x35}) [ 1206.407186][T22427] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc5c}]}, 0x1c}}, 0x0) 21:37:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) [ 1206.492636][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1206.501879][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000060000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1206.540431][T22439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1206.557735][T22438] tmpfs: Unknown parameter '5' [ 1206.577518][T22446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1206.772254][ T9313] usb 1-1: new high-speed USB device number 122 using dummy_hcd [ 1207.132624][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1207.140767][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1207.142314][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1207.212565][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1207.232632][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1207.241635][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1207.250373][ T9313] usb 1-1: Manufacturer: syz [ 1207.257202][ T9313] usb 1-1: config 0 descriptor?? [ 1207.305662][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1207.506754][ T9313] usb 1-1: USB disconnect, device number 122 [ 1208.302246][ T5057] usb 1-1: new high-speed USB device number 123 using dummy_hcd [ 1208.702246][ T5057] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1208.792557][ T5057] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1208.801586][ T5057] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1208.810338][ T5057] usb 1-1: Manufacturer: syz [ 1208.817302][ T5057] usb 1-1: config 0 descriptor?? [ 1208.864915][ T5057] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:37:29 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8200, 0x100) syncfs(r0) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:37:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setopts(0x4206, r1, 0xfffffffeffffffff, 0x12) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc80}]}, 0x1c}}, 0x0) 21:37:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000068000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:29 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$setperm(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000300)) 21:37:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [], 0x35}) [ 1209.064471][ T9313] usb 1-1: USB disconnect, device number 123 21:37:29 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$audion(0x0, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x3, 0x1, 0xfffb, 0xfffc, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0)=0x202, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) 21:37:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000040030000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1209.109672][T22488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1209.136665][T22493] tmpfs: Bad value for 'mpol' [ 1209.142015][T22498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xcac}]}, 0x1c}}, 0x0) 21:37:29 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 21:37:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [], 0x35}) [ 1209.247719][T22509] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1209.259402][T22510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1209.292501][T12097] net_ratelimit: 4 callbacks suppressed [ 1209.292508][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1209.313843][T22515] IPVS: ftp: loaded support on port[0] = 21 [ 1209.334799][T22516] tmpfs: Bad value for 'mpol' [ 1209.552223][ T9313] usb 1-1: new high-speed USB device number 124 using dummy_hcd [ 1209.587219][T22515] IPVS: ftp: loaded support on port[0] = 21 [ 1209.649267][T18314] tipc: TX() has been purged, node left! [ 1209.942233][ T9313] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1210.062549][ T9313] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1210.071574][ T9313] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1210.080882][ T9313] usb 1-1: Manufacturer: syz [ 1210.088699][ T9313] usb 1-1: config 0 descriptor?? [ 1210.155680][ T9313] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1210.333262][T18314] tipc: TX() has been purged, node left! [ 1210.342904][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1210.354001][ T5057] usb 1-1: USB disconnect, device number 124 [ 1211.142237][T12097] usb 1-1: new high-speed USB device number 125 using dummy_hcd [ 1211.372424][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1211.502574][T12097] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1211.532556][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1211.592692][T12097] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1211.601742][T12097] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1211.610153][T12097] usb 1-1: Manufacturer: syz [ 1211.615323][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1211.615557][T12097] usb 1-1: config 0 descriptor?? [ 1211.630740][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1211.663911][T12097] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:37:32 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x800) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000100)={0x7fffffff, 0x7, &(0x7f0000000040)=[0x8, 0x1ff, 0x8b27, 0x81, 0x5, 0x200, 0x4], &(0x7f0000000080)=[0xfffb, 0xff01, 0x2, 0x0, 0x51, 0x6, 0x9, 0x8000], &(0x7f00000000c0)=[0x0, 0x8001, 0x0]}) syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) 21:37:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xcd0}]}, 0x1c}}, 0x0) 21:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000003400000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [], 0x35}) 21:37:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x8, 0x0, 0x0, 0x4, 0x1, 0xcb8, "dce8d5e7eea6126c"}}, 0x120) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(r0, &(0x7f00000017c0), 0x1b8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) 21:37:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1211.872266][ T9102] usb 1-1: USB disconnect, device number 125 [ 1211.934478][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1211.936391][T22612] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1211.959522][T22607] tmpfs: Bad value for 'mpol' 21:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000100000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1211.988228][T22617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0]}}}}], [], 0x35}) 21:37:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xcf4}]}, 0x1c}}, 0x0) [ 1212.127136][T22625] tmpfs: Bad value for 'mpol' 21:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000200000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0]}}}}], [], 0x35}) [ 1212.162326][T22629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a287fba6178df06, @perf_bp, 0x34e5, 0x0, 0x0, 0x9, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000040)={0x2b}, 0x8) [ 1212.237318][T22635] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1212.253136][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1212.314759][T22638] tmpfs: Bad value for 'mpol' [ 1212.334665][ T9102] usb 1-1: new high-speed USB device number 126 using dummy_hcd [ 1212.412288][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1212.754313][ T9102] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1212.854221][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1212.866600][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1212.885214][ T9102] usb 1-1: Manufacturer: syz [ 1212.892700][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1212.906865][ T9102] usb 1-1: config 0 descriptor?? [ 1212.955617][ T9102] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1213.156176][ T9102] usb 1-1: USB disconnect, device number 126 [ 1213.942195][T12097] usb 1-1: new high-speed USB device number 127 using dummy_hcd [ 1214.302511][T12097] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1214.412511][T12097] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1214.421549][T12097] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1214.442215][T12097] usb 1-1: Manufacturer: syz [ 1214.456361][T12097] usb 1-1: config 0 descriptor?? [ 1214.492349][ T1340] net_ratelimit: 2 callbacks suppressed [ 1214.492356][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1214.508323][T12097] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:37:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000300000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xd18}]}, 0x1c}}, 0x0) 21:37:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0]}}}}], [], 0x35}) 21:37:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/82, 0x52}, {&(0x7f0000000080)=""/114, 0x72}], 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1214.712197][ T5057] usb 1-1: USB disconnect, device number 127 [ 1214.803075][T22681] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1214.814870][T22679] tmpfs: Bad value for 'mpol' [ 1214.846503][T22685] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1214.982263][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1214.990804][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1215.000150][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1215.009053][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1215.533265][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:36 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000400000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0, 0x0]}}}}], [], 0x35}) 21:37:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xd44}]}, 0x1c}}, 0x0) 21:37:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = syz_io_uring_setup(0x6b52, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000480)="7c7ff8e98207c5a6c9bed7a5804cbd7938e6a5d2f2bb61e8c2d5bed2f2db130a5cba0e1ae25741728d1376d746201820e106c8f1a87bb0e043991a8ccb232ea6974df9a69344ad5736504aebd7738e11c22ca01db04c85712927c3396a5165a05091cdf3d17e7356e80d9ece6608f5be195b53b86b7440ddcc1ccc0c0003cf89878533f8053aa3ecc4f529c5bb289c84ae430b23323d8ee64fbca1845f520313de0e5d29cdcca32b1e77c9bf379935b2d8cd1976bec9cd9e1fdd1dbb6cc52b6c523efe0aa4c2f8e94a96f8e00925fdd235ae0c7473d50f7f5fb43d262d90bee9a0a77ba1263bb4bf45", 0xe9, 0x40000001, 0x1}, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_GET_XCRS(r9, 0x8188aea6, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000000000000ff01000000000000080000000000000006000000000000003f000000000000000000000000000000ffff00000000000000f8ffff0000000009000000000000000700000000000000ff7f000000000000ab000000000000000800000000000000008000000000000002285b476b1f915ac400000000000001000000000000007f0e00000000000004c1b68bc60000003f"]) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r7, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0x6c4, r10, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_IE={0x6a3, 0x2a, "eea62e9e1c5159b91103c575135e424473b9ec8b0441cf88628ccc4633066173580307bd952f4a75606cc547da081f13aede8a490b612060e843e3e934fbde94b0b62f799667aede19ef4e23d09ba9c572428780f06594631917c10f44269a420f3bd4d41432ba176e89d5673b3a2a26cc6c6b608d724cd107ca20007fd9dbcbff6ed37984e52d58a7c0a497a539325a342d00a5334806326315e65f8067389b76f71eb74831a302901376aadf19595ba3efcda8088f5ea6ca64f4483bef6984716e75067960a7f6c65ed58a89679e16fb51dc693d1fa335de37d20d3db0928cbdb3c3b220b480c4ab6c15c3cd636355aabf6a4840d90c752bc6ca21c86e7092e64c482aa22da5a3fb336dab12eb1b3f9341e55b325faa538d186d293aea3efbb653efbc611e35aec9d5ba97ae8f578fb6c312f6f0a740c4079313b36482c3b36af3fba46d47a9c191fa68bc5c4d69aef5e3695d594c6346f2f4d2900560cbf4ac2803add50bc10bfeb6fdcf94bfc0d3936900e2f2594c709a5f4736ee77f02b0c1afa5fd882a69f4dee6774fa8f1c4df27041da5350f0f703f842ee745dc6ac8c25a797aa282e7286c41eb12d80763e141d9fe4658cff58850a6495c2138cc17b65bacfcc2c874cedb3771f3fb11df2028a976f1ea2989b7fcb227cf4f2609e7b3b3fe294bc0668855a4a72e760209df4b17114fa5c90d4c67ca989d4046af36534fd2f6050e4d579a845ea27e93f27fcc3a3685946d10cec33fad39f097a5ef8c212624b376b847da47be590fd0edc107613bd4b64de32df31acc00e11cd00567c0b2d2864dc54b4a7a63cfdb511d85d3842f3578a1cfd047413824526d25855238285afb3067449b869e5ee48a43ead98b308eea4932498cafd30d6f63318d79a2796123cceaddc5fa6213e0d8a9f0a976406c0f8e38fe231d89c70d923cc0421ead841012e09e6511c13891d2339ee14a698fd3e8c488a47d462d7c7c28579e9f1b3161fa46ee25b719fd0ec39592ee6c5474218fd8e170db3f6f91b7c1d61d5041c554cfb405c2363c8b6264d94cb7be1722b9bee6a7d6cbacad91ffc97941268ba469d5f21e73d2789a22d600ee332dc06bfbef7af396df080d9916eb19572c91dc9003c986ac2be843a3d1f75b0d42c5082ef6c4abb50b2b996228acc8fd3293472cc28899ef4f57a23716777bfc0c54b0735d9071a7fc96eab6e47f725a562e421fd2d1831721f256e6065659a3b7fb4e45907938db6e1a3d02c435b929c55142723525df95362acbf2d85eadbe991183e5201d641ef120ba302c0f592063bd24e69ba748a4bee34e9da8719b06d7e4325a44721fdb8e121735511cf61f2c17ba3be4a8aff87176922989b56ef7acbe40c63903ece29925f17c018467428459ecae8b84b7d7f82ad8615686e8ea2af576d4543fe389f12d7257cd3d9ba73138b9a5a0e752e9b1de74a505d11b433f7cd4745f6e52b4cd2e99c2fefdb739e02a933460be462b08c3031f683703b2de1e8c0619cbc648d3fb2779bdc9bb0efb7c00d8858f2a506c29a19b7bf7e7d01e8239003a0ef06487dc97e8e65ccacbdf0259bec0a53b05f69f058ea9544bbc90ebb2af309194b2b45bf2fe8bf5d27ad9dcbec50de8438099c71a1de0854d1a55aa1790556328fa61370bd8d2ddb67e717ba7c1aa6b67ee82c10c0b4da1d2ed4f9935c6a67bee89dce335abb33dc3d33f32df72b1991d9679ecf691893bf6814fab02037e2e355fcb8ed5f56b172f11611dd20db116c9d754ad06da25f22ded82e0696ad789a7c551bf386a9e26c90787af1589c4f2a4f54b29cf449b6c2ee610c10ca27a298bc02fef5af0dd6d7faa5e60dedebb4d9409ceca2d6d6881dc239e544c131d522f216a7854bae13e4463f4a3634bba2f9dfc756f5d9c430a8179161e25cfcf2d55e60d19cb9164e5391e6bc2ec1ef24872c2ed120f7de9c49ff89c4afe3929b44c0a1e04281c69b2bb684e6d7bc678c74dc09b080fc4f5d6f3253fe1fbb589a9ad4eac233942cab9827fad9cc6da18ff426842037e12505ed9c2c321fef5622c0354757d77e07ac00c390b91b908983983108c33c94c021cd18bde8d787febea647bb0a6efcad73255cbe2922d47395dc36b7a8781ae5408c5c832e503022b2535cb080eed22e97f22919aa7c6f502202e66b8a04cd0ec392da0fbb9f96a0bd4ce2317625f1061917b5b0ddb0cf15b1a120d46b218d4a63c652c689f3717d298202d3fc0363ee1cfd4607d7b02d797c52a174c42d9bb41da187f696b77c78badb98f29e7c72ad9eea1b2a1dfc3c6a7121717b471bed1727028788b40374b8d44fd4fe186d4fe6ba10e70132f7f5ee77fdf54dd111390437d759976da7395923f0011bbc271bd9ea"}]}, 0x6c4}}, 0x48011) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x1d4, r0) r11 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000040), 0x0, r11) keyctl$search(0xa, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, r11) accept(r1, &(0x7f00000003c0)=@in={0x2, 0x0, @empty}, &(0x7f0000000440)=0x80) 21:37:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000500000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1216.061451][T22705] tmpfs: Bad value for 'mpol' [ 1216.062262][T22704] BPF:[1] FWD [ 1216.069830][T22707] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1216.087154][T22710] BPF:[1] FWD [ 1216.096194][T22704] BPF:struct [ 1216.101610][T22710] BPF:struct 21:37:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0, 0x0]}}}}], [], 0x35}) [ 1216.112171][T22704] BPF: [ 1216.120721][T22710] BPF: [ 1216.125920][T22704] BPF:type != 0 [ 1216.131775][T22710] BPF:type != 0 [ 1216.137634][T22719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000800000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:36 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:36 executing program 0: syz_usb_connect(0x0, 0x34, &(0x7f0000002c40)=ANY=[@ANYBLOB="120100001c00f540c007011514aa740000010902220001000000000904"], 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xa100, 0x0) [ 1216.174656][T22704] BPF: [ 1216.174656][T22704] [ 1216.183945][T22710] BPF: [ 1216.183945][T22710] 21:37:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xd68}]}, 0x1c}}, 0x0) [ 1216.260950][T22727] tmpfs: Bad value for 'mpol' 21:37:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000100)={0x0, 0x7, 0x3, [], &(0x7f00000000c0)=0x5}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x804}, 0x6c23}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000080)={'ipvlan1\x00', {0x2, 0x4e22, @local}}) socket$rxrpc(0x21, 0x2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) 21:37:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x0, 0x0]}}}}], [], 0x35}) [ 1216.319288][T22737] BPF:[1] FWD [ 1216.336836][T22737] BPF:struct [ 1216.346247][T22741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1216.360184][T22737] BPF: 21:37:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000900000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:36 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1216.372724][T22737] BPF:type != 0 [ 1216.378813][T22737] BPF: [ 1216.378813][T22737] 21:37:36 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1216.420103][T22749] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1216.434249][T22751] tmpfs: Bad value for 'mpol' [ 1216.445474][T22754] BPF:[1] FWD [ 1216.449015][T22754] BPF:struct [ 1216.452508][T22754] BPF: [ 1216.455390][T22754] BPF:type != 0 [ 1216.458914][T22754] BPF: [ 1216.458914][T22754] 21:37:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) 21:37:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xd8c}]}, 0x1c}}, 0x0) 21:37:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000f00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1216.538368][T22760] BPF:[1] FWD [ 1216.541872][T22760] BPF:struct [ 1216.551103][T22760] BPF: [ 1216.559939][T22760] BPF:type != 0 [ 1216.572333][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1216.574643][T22760] BPF: [ 1216.574643][T22760] 21:37:36 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 21:37:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1216.583838][T12097] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1216.662077][T22779] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1216.674381][T22780] BPF:[1] FWD [ 1216.681157][T22780] BPF:struct [ 1216.687885][T22783] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1216.690109][T22780] BPF: [ 1216.714023][T22780] BPF:type != 0 [ 1216.731045][T22780] BPF: [ 1216.731045][T22780] [ 1216.736691][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1216.744790][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1216.962660][T12097] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1217.052613][T12097] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1217.061656][T12097] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1217.090205][T12097] usb 1-1: Manufacturer: syz [ 1217.101313][T12097] usb 1-1: config 0 descriptor?? [ 1217.154012][T12097] iowarrior 1-1:0.0: no interrupt-in endpoint found [ 1217.354872][ T9313] usb 1-1: USB disconnect, device number 2 [ 1217.372571][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1218.132194][ T9102] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1218.492594][ T9102] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1218.582654][ T9102] usb 1-1: New USB device found, idVendor=07c0, idProduct=1501, bcdDevice=aa.14 [ 1218.591775][ T9102] usb 1-1: New USB device strings: Mfr=116, Product=0, SerialNumber=0 [ 1218.600350][ T9102] usb 1-1: Manufacturer: syz [ 1218.605881][ T9102] usb 1-1: config 0 descriptor?? [ 1218.643845][ T9102] iowarrior 1-1:0.0: no interrupt-in endpoint found 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:37:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xdb0}]}, 0x1c}}, 0x0) 21:37:39 executing program 1: geteuid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000001400000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 21:37:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1218.844242][ T9102] usb 1-1: USB disconnect, device number 3 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1218.900771][T22822] BPF:[1] FWD [ 1218.906960][T22822] BPF:struct [ 1218.909961][T22824] __nla_validate_parse: 2 callbacks suppressed [ 1218.909967][T22824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1218.911006][T22822] BPF: [ 1218.928592][T22825] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1218.935964][T22830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1218.947461][T22822] BPF:type != 0 21:37:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000003400000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1218.958274][T22822] BPF: [ 1218.958274][T22822] 21:37:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xdd4}]}, 0x1c}}, 0x0) 21:37:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 21:37:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000004800000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1219.071348][T22843] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1219.086289][T22845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.107204][T22847] BPF:[1] FWD 21:37:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000080)={0x1000, 0x2000}) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/27, &(0x7f0000000040)=0x1b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 1219.132054][T22847] BPF:struct [ 1219.134159][T22852] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1219.145659][T22847] BPF: [ 1219.159524][T22857] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.165220][T22847] BPF:type != 0 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 1219.184277][T22847] BPF: [ 1219.184277][T22847] 21:37:39 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:37:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xdfc}]}, 0x1c}}, 0x0) 21:37:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000015200000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1219.227612][T22865] xt_CT: You must specify a L4 protocol and not use inversions on it 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 1219.283991][T22869] 9pnet: Insufficient options for proto=fd [ 1219.317623][T22876] xt_CT: You must specify a L4 protocol and not use inversions on it 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) [ 1219.334770][T22877] BPF:[1] FWD [ 1219.338627][T22879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.351945][T22877] BPF:struct [ 1219.364279][T22877] BPF: [ 1219.370189][T22877] BPF:type != 0 [ 1219.379756][T22877] BPF: [ 1219.379756][T22877] 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 21:37:39 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1219.386391][T22885] 9pnet: Insufficient options for proto=fd [ 1219.389939][T22886] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.460292][T22892] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1219.475419][T22891] 9pnet: Insufficient options for proto=fd [ 1219.502802][T22895] BPF:[1] FWD [ 1219.506582][T22895] BPF:struct [ 1219.509831][T22895] BPF: [ 1219.513482][T22895] BPF:type != 0 [ 1219.516989][T22895] BPF: [ 1219.516989][T22895] 21:37:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:37:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:37:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000006000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xe20}]}, 0x1c}}, 0x0) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:37:39 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) [ 1219.627636][T22907] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.645109][T22911] 9pnet: Insufficient options for proto=fd [ 1219.661693][T22912] BPF:[1] FWD 21:37:39 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:37:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000006800000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1219.674585][T22919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.678040][T22912] BPF:struct [ 1219.693479][T12097] net_ratelimit: 6 callbacks suppressed [ 1219.693485][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1219.703707][T22912] BPF: 21:37:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xe44}]}, 0x1c}}, 0x0) 21:37:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) [ 1219.726000][T22912] BPF:type != 0 [ 1219.739622][T22912] BPF: [ 1219.739622][T22912] 21:37:39 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:37:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0xffffffff, 0x0, 0xd8, 0x0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x8}}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x12, "5ba7", 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x5, 0x9, [0x1c, 0x37, 0xa, 0x3b, 0x2f, 0x4, 0x20, 0x3, 0x26, 0x12, 0xb, 0xc, 0x31, 0x27, 0x3, 0x1c], 0x2, 0x0, 0x1}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0xc, 0x94, 0x2}}, @common=@set={{0x40, 'set\x00'}, {{0x4, [0x4, 0x7, 0x3, 0x4, 0x1, 0x7], 0x0, 0x3}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x8060}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1219.836083][T22933] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1219.846783][T22932] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.871555][T22939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1219.932617][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1220.732320][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1221.132552][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1221.772307][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1221.853635][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1222.422453][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1222.492798][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:42 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:37:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000ffffff9e00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:42 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:37:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:37:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xe68}]}, 0x1c}}, 0x0) 21:37:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:37:42 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:37:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) [ 1222.609797][T22950] xt_CT: You must specify a L4 protocol and not use inversions on it 21:37:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xe80}]}, 0x1c}}, 0x0) 21:37:42 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000ffffffef00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1222.699746][T22967] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1222.709696][T22963] 9pnet: Insufficient options for proto=fd 21:37:42 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:42 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:37:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xe94}]}, 0x1c}}, 0x0) 21:37:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x5c102, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0x60, 0x2) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000100)={0x1, 0x1, &(0x7f0000000000)=""/42, &(0x7f0000000040)=""/22, &(0x7f0000000080)=""/103, 0x2}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000200)={0x9}) [ 1222.812855][T22984] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1222.822425][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1223.134169][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1224.903424][ T9313] net_ratelimit: 3 callbacks suppressed [ 1224.903431][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:37:45 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:37:45 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000fffffff000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:45 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xeac}]}, 0x1c}}, 0x0) 21:37:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) connect(r1, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x4, 0x4, {0xa, 0x4e21, 0x4, @remote, 0x401}}}, 0x80) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1225.692624][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1225.705811][T23008] __nla_validate_parse: 6 callbacks suppressed [ 1225.705817][T23008] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1225.728633][T23004] xt_CT: You must specify a L4 protocol and not use inversions on it 21:37:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00007fffffff00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:45 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xecc}]}, 0x1c}}, 0x0) [ 1225.743644][T23015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:37:45 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:37:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00009effffff00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:37:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = shmget(0x1, 0x1000, 0x200, &(0x7f0000bd2000/0x1000)=nil) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x2000) [ 1225.843259][T23025] BPF:Invalid magic [ 1225.862960][T23026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1225.881477][T23031] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1225.913904][T23038] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1225.933927][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1226.982394][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1227.222354][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1227.612655][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1227.620782][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1228.012295][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1228.252736][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1228.260956][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1230.092291][T12097] net_ratelimit: 3 callbacks suppressed [ 1230.092298][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1230.252349][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1230.812860][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1231.132453][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1232.172404][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1232.652677][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1233.212414][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1233.292283][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1233.372585][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1233.380693][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1235.293064][T12097] net_ratelimit: 3 callbacks suppressed [ 1235.293069][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1236.332307][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1236.340412][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1237.372412][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1237.852398][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1237.852605][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1237.868570][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1238.412379][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1239.052585][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1239.133110][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1240.492344][ T9313] net_ratelimit: 4 callbacks suppressed [ 1240.492351][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1241.532389][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.333121][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.341532][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.350061][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.358627][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.412403][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.572640][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1242.972694][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1243.612419][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1245.692365][ T9313] net_ratelimit: 7 callbacks suppressed [ 1245.692369][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1246.732302][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1247.772380][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1248.492313][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1248.742568][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1248.812272][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1249.372746][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1249.380835][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1249.853348][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1250.012690][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1250.892588][ T1340] net_ratelimit: 2 callbacks suppressed [ 1250.892593][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1251.532346][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1251.932374][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1251.940471][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1252.972342][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1254.012375][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1254.492654][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1254.500762][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1254.508857][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1254.574122][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1256.092455][ T9313] net_ratelimit: 3 callbacks suppressed [ 1256.092460][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:16 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:16 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:38:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000efffffff00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xeec}]}, 0x1c}}, 0x0) 21:38:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$FITHAW(r2, 0xc0045878) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:16 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1256.426338][T23049] BPF:Invalid magic 21:38:16 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:16 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) [ 1256.484851][T23063] BPF:Invalid magic [ 1256.495080][T23062] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:16 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:16 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:38:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000f0ffffff00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1256.526491][T23070] BPF:Invalid magic [ 1256.542465][T23074] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1256.585719][T23079] BPF:Invalid magic [ 1257.132330][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1257.612294][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1258.172324][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1259.212318][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:19 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:19 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 21:38:19 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xf10}]}, 0x1c}}, 0x0) 21:38:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000100000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) setsockopt$inet6_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000080)="70392e89d160c018253501ac0d290f2b828d934cd1e3ade268c6deda1bd3", 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r3) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000100)) fcntl$getflags(r3, 0x1) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:19 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1259.464380][T23101] BPF:Invalid magic [ 1259.471723][T23103] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:19 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:19 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 21:38:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000034000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1259.507626][T23111] BPF:Unsupported section found [ 1259.520520][T23115] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:19 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) [ 1259.584303][T23121] BPF:Unsupported section found 21:38:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xf34}]}, 0x1c}}, 0x0) [ 1259.612970][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1259.621621][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1259.691008][T23133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1259.735045][T23135] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1260.252773][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1260.260906][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1260.269096][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1261.292893][ T1340] net_ratelimit: 3 callbacks suppressed [ 1261.292900][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1261.532516][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1262.332403][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:22 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2d0, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x330) 21:38:22 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000001000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xf58}]}, 0x1c}}, 0x0) 21:38:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000)={0x3, 0x8, 0x80000001, 0x0, 0xbc3d}, 0x14) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:22 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2d0, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x330) 21:38:22 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1262.547142][T23157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1262.561607][T23154] BPF:Unsupported section found 21:38:22 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2d0, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x330) 21:38:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000002000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:22 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1262.594903][T23160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1262.630023][T23167] BPF:[1] Invalid kind:0 21:38:22 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xa0, 0x8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) [ 1262.735910][T23179] BPF:[1] Invalid kind:0 [ 1263.372569][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1263.692333][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1264.412374][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1264.733190][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1265.372880][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1265.380997][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1265.452325][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000003000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xf7c}]}, 0x1c}}, 0x0) 21:38:25 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:25 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xa0, 0x8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) 21:38:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40000, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:25 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:25 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xa0, 0x8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) 21:38:25 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1265.576223][T23195] BPF:[1] Invalid kind:0 [ 1265.587267][T23201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:25 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8"}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:38:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000004000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:25 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1265.647818][T23209] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1265.668554][T23210] BPF:[1] Invalid kind:0 21:38:25 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8"}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xfa0}]}, 0x1c}}, 0x0) 21:38:25 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1265.733152][T23221] BPF:[1] Invalid kind:0 [ 1265.798682][T23228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1265.809843][T23230] BPF:[1] Invalid kind:0 [ 1265.829319][T23232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:26 executing program 3: clone(0x780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8"}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 21:38:26 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:26 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xfc0}]}, 0x1c}}, 0x0) 21:38:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000005000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000040)=@assoc_value, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x5}, 0xc) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80089, &(0x7f0000000300)=ANY=[]) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000200)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000180)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x3, 0x0, 0x0, 0x10000000002) 21:38:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0) [ 1266.444416][T23248] BPF:[1] FWD [ 1266.459941][T23249] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1266.472595][T23248] BPF:struct [ 1266.479604][T23248] BPF: [ 1266.490343][T23248] BPF:Invalid name 21:38:26 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000008000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1266.494587][T12097] net_ratelimit: 1 callbacks suppressed [ 1266.494593][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1266.517079][T23256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1266.517896][T23248] BPF: [ 1266.517896][T23248] 21:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xfe4}]}, 0x1c}}, 0x0) 21:38:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00'}) r1 = socket(0x10, 0x80803, 0x0) write(r1, &(0x7f0000000000)="120000001a003517fc85bc00fef6000d0a0d", 0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 21:38:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000000)={0x0, 0xff, 0x4, {0x0, @sliced={0x8, [0x7, 0x7, 0x8001, 0x800, 0x3, 0x7, 0x6, 0x5, 0x8, 0x2, 0x7, 0x4, 0xffff, 0x8000, 0x1, 0x9, 0x4, 0x7fff, 0x1, 0x0, 0x401, 0x3, 0x0, 0x7, 0x2264, 0x1f, 0x3, 0x8000, 0x3, 0x20, 0x3, 0x2, 0x200, 0x2, 0xf36, 0x1, 0x20, 0x7, 0x4, 0xfc01, 0x7, 0x5, 0x5, 0x8, 0xffff, 0x8000, 0x800, 0x8], 0x5}}, 0x92}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1266.591942][T23263] BPF:[1] FWD [ 1266.597786][T23263] BPF:struct [ 1266.630890][T23263] BPF: [ 1266.638495][T23270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1266.647942][T23263] BPF:Invalid name [ 1266.653301][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1266.656029][T23263] BPF: [ 1266.656029][T23263] [ 1266.661720][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1266.668407][T23273] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:26 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1266.697861][T23274] device lo left promiscuous mode [ 1266.742365][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1266.746889][T23278] BPF:[1] FWD [ 1266.755435][T23278] BPF:struct [ 1266.758738][T23278] BPF: [ 1266.761544][T23278] BPF:Invalid name [ 1266.768593][T23278] BPF: [ 1266.768593][T23278] [ 1266.807090][T23274] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 1266.844176][T23274] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1266.934289][T23277] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 1266.962378][T23277] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 21:38:27 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x100c}]}, 0x1c}}, 0x0) 21:38:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000009000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:27 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000700"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x40, 0x90) bind$qrtr(r1, &(0x7f0000000040)={0x2a, 0x1, 0x4000}, 0xc) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:27 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5013, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x49, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1dc}}}}]}}]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @private2, @ipv4={[], [], @broadcast}, 0x7}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000140)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="ec0f6803"], 0x0, 0x0, 0x0, 0x0}, 0x0) 21:38:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000000000000f000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1267.317061][T23302] BPF:[1] FWD [ 1267.328718][T23302] BPF:struct [ 1267.340885][T23302] BPF: [ 1267.351886][T23302] BPF:Invalid name [ 1267.363991][T23302] BPF: 21:38:27 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000700"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 21:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1030}]}, 0x1c}}, 0x0) [ 1267.363991][T23302] 21:38:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000014000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1054}]}, 0x1c}}, 0x0) 21:38:27 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000700"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 1267.418643][T23318] BPF:[1] FWD [ 1267.426280][T23318] BPF:struct [ 1267.434672][T23318] BPF: [ 1267.444160][T23318] BPF:Invalid name [ 1267.456575][T23318] BPF: [ 1267.456575][T23318] [ 1267.531820][T23328] BPF:[1] FWD [ 1267.535465][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1267.556977][T23328] BPF:struct [ 1267.570109][T23328] BPF: [ 1267.580649][T23328] BPF:Invalid name [ 1267.584551][ T1340] usb 4-1: new high-speed USB device number 109 using dummy_hcd [ 1267.599761][T23328] BPF: [ 1267.599761][T23328] [ 1267.842233][ T1340] usb 4-1: Using ep0 maxpacket: 16 [ 1267.962462][ T1340] usb 4-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 1267.973210][ T1340] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1267.984083][ T1340] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1267.993887][ T1340] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 1268.006815][ T1340] usb 4-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 1268.015880][ T1340] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1268.024801][ T1340] usb 4-1: config 0 descriptor?? 21:38:28 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000034000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1078}]}, 0x1c}}, 0x0) 21:38:28 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], 0x0, 0x52, 0x0, 0x8}, 0x20) 21:38:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$NBD_SET_SOCK(r2, 0xab00, r4) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1268.148954][T23347] __nla_validate_parse: 6 callbacks suppressed [ 1268.148961][T23347] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1268.194779][T23354] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1268.507068][ T1340] input: HID 0458:5013 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0458:5013.0002/input/input21 [ 1268.519735][ T1340] input: HID 0458:5013 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0458:5013.0002/input/input22 [ 1268.572823][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1268.599746][ T1340] kye 0003:0458:5013.0002: input,hiddev0,hidraw0: USB HID v0.00 Device [HID 0458:5013] on usb-dummy_hcd.3-1/input0 [ 1268.705223][ T1340] usb 4-1: USB disconnect, device number 109 [ 1269.472217][ T5057] usb 4-1: new high-speed USB device number 110 using dummy_hcd [ 1269.622334][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1269.722221][ T5057] usb 4-1: Using ep0 maxpacket: 16 [ 1269.772323][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1269.842368][ T5057] usb 4-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 1269.853138][ T5057] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1269.853453][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1269.865104][ T5057] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1269.882468][ T5057] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 1269.900289][ T5057] usb 4-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 1269.909404][ T5057] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1269.918905][ T5057] usb 4-1: config 0 descriptor?? 21:38:30 executing program 3: unshare(0x44000600) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) 21:38:30 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], 0x0, 0x52, 0x0, 0x8}, 0x20) 21:38:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000048000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x109c}]}, 0x1c}}, 0x0) 21:38:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000f, 0x13, r0, 0x3000) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f00000000c0)) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1000) 21:38:30 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:30 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], 0x0, 0x52, 0x0, 0x8}, 0x20) [ 1270.338820][T23416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:30 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e}, 0x20) 21:38:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000152000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:30 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e}, 0x20) [ 1270.392566][ T5057] usbhid 4-1:0.0: can't add hid device: -71 [ 1270.398528][ T5057] usbhid: probe of 4-1:0.0 failed with error -71 [ 1270.412636][T23425] IPVS: ftp: loaded support on port[0] = 21 21:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x10c0}]}, 0x1c}}, 0x0) 21:38:30 executing program 5: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070005"], &(0x7f0000000340)=""/142, 0x52, 0x8e}, 0x20) [ 1270.461502][ T5057] usb 4-1: USB disconnect, device number 110 [ 1270.545148][T23456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1270.591138][T23425] IPVS: ftp: loaded support on port[0] = 21 [ 1270.598757][T23473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045569, 0x0) 21:38:30 executing program 5: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002f80)={0x0, 0x0, &(0x7f000000a3c0)=[{0x0, 0x1}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x8}], 0x300, 0x0, 0x0) 21:38:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000060000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x10e4}]}, 0x1c}}, 0x0) [ 1270.652611][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1270.664855][ T1082] tipc: TX() has been purged, node left! [ 1270.733095][T23500] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1270.763733][T23504] input: syz1 as /devices/virtual/input/input23 [ 1270.780487][T23507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1270.817692][T23504] input: syz1 as /devices/virtual/input/input24 21:38:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') close(r0) 21:38:31 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000068000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1108}]}, 0x1c}}, 0x0) 21:38:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "940013d500000000dfff0000ec2e001900"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xffffffee, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 21:38:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x49, 0x0, 0x0, 0x7e, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0x7d, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r5, &(0x7f0000000080)={r4, r7, 0x6}) [ 1271.225155][T23537] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000080000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:31 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0e"], 0x86) 21:38:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1271.332711][T23553] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x112c}]}, 0x1c}}, 0x0) 21:38:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1212, 0x0, 0x0, 0x8, 0x0, 0xffffffff}, 0x0, 0xb, 0xffffffffffffffff, 0xdbf2984d73dd7388) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000ffffff9e000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1271.440271][T23567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1271.692456][ T1340] net_ratelimit: 3 callbacks suppressed [ 1271.692463][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1271.722692][ T1082] tipc: TX() has been purged, node left! [ 1271.773035][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(0x0, 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000000)="0169f90577a56f05a1ca1ed26a318129cc13ea47e3221180c0", 0x19}], 0x1) 21:38:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') pwrite64(r0, 0x0, 0x0, 0x0) 21:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1150}]}, 0x1c}}, 0x0) 21:38:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000ffffffef000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$OSF_MSG_REMOVE(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x268, 0x1, 0x5, 0x201, 0x0, 0x0, {0xc, 0x0, 0x1}, [{{0x254, 0x1, {{0x3, 0x9}, 0x5, 0x5a, 0x4, 0x800, 0xf, 'syz1\x00', "929ea4ed106811fa4e3bac2c239ed508379ac039d16060a15484b79461ecdd51", "18813d0dcee6724cae1aee45e55eab7947f1182081795a05848af12cd9b68e44", [{0xfff, 0x4, {0x0, 0x40000000}}, {0x7fff, 0x7, {0x3, 0x1}}, {0x6, 0xe251, {0x1, 0x8000}}, {0x7ff, 0x7, {0x0, 0x8}}, {0x3, 0x3, {0x0, 0x10000}}, {0x6, 0x8b, {0x2, 0x80000001}}, {0x8, 0x6e, {0x0, 0x9}}, {0xffff, 0x80, {0x2}}, {0xcfa3}, {0xfffa, 0x0, {0x0, 0x1}}, {0x7, 0x7b3a, {0x2, 0x9}}, {0x7f, 0x1000, {0x1, 0x2}}, {0x4, 0x60, {0x1, 0x3}}, {0x3ff, 0x5e6, {0x3, 0x100}}, {0x4, 0x1, {0x2, 0x9}}, {0xb7, 0x80, {0x1, 0x1}}, {0x54, 0x2, {0x1, 0x3}}, {0x1, 0x7, {0x2, 0x1}}, {0x8, 0xffff, {0x3, 0xb9e}}, {0x70d, 0x5, {0x1, 0xd5f7}}, {0x1, 0x0, {0x3, 0x80}}, {0x1, 0x9, {0x1, 0x3}}, {0x8001, 0x5, {0x1, 0x10000}}, {0x1f, 0x1ac4, {0x1, 0x687}}, {0x40, 0x7, {0x1, 0x9}}, {0x39dd, 0x3f, {0x6, 0x2}}, {0x1, 0x1, {0x1}}, {0x8, 0x9, {0x0, 0x10001}}, {0x8001, 0x0, {0x3, 0xf05}}, {0x800, 0x5e, {0x2, 0x3}}, {0x4f5, 0xdbf, {0x0, 0xfffffff9}}, {0x2, 0x0, {0x1, 0xb5}}, {0xc5, 0x6, {0x1, 0x73}}, {0x7f, 0x3, {0x0, 0x80000001}}, {0x8, 0x6, {0x3, 0x84}}, {0x8, 0x7490, {0x3, 0x175}}, {0x0, 0x1ff, {0x0, 0x8}}, {0x401, 0x19, {0x0, 0x7fff}}, {0x189, 0x80, {0x1, 0x8001}}, {0xe35, 0x9, {0x3, 0x1}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x80}, 0x24088) getdents64(r0, &(0x7f0000000000)=""/255, 0xff) 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(0x0, 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1174}]}, 0x1c}}, 0x0) 21:38:32 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 21:38:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000fffffff0000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1272.116792][T23598] input: syz1 as /devices/virtual/input/input25 [ 1272.155751][T23598] input: syz1 as /devices/virtual/input/input26 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(0x0, 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) 21:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1198}]}, 0x1c}}, 0x0) 21:38:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x7fffffff) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000040)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x10, 0x1f) 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1272.271807][T23619] input: syz1 as /devices/virtual/input/input27 [ 1272.307032][T23619] input: syz1 as /devices/virtual/input/input28 21:38:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000007fffffff000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='loginuid\x00') writev(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="8a", 0x1}], 0x1) 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x11bc}]}, 0x1c}}, 0x0) 21:38:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x50) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) [ 1272.417375][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1272.426666][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x8) [ 1272.506115][ T27] audit: type=1804 audit(1597095512.650:167): pid=23655 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1783/file1/bus" dev="loop3" ino=218 res=1 errno=0 21:38:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000ffffffff000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x8) 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x11e0}]}, 0x1c}}, 0x0) 21:38:32 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1272.732323][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1272.752922][ T27] audit: type=1804 audit(1597095512.650:168): pid=23655 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1783/file1/bus" dev="loop3" ino=218 res=1 errno=0 21:38:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000002000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x8) [ 1272.812366][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x100, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x8241a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000001340)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x5, 0x3f, 0x1, "30f6dd3e1a2b032e61559f693a2e9e00dd5aa26123ed5d10878bba4774d03e722685e8229da8e2cd2afe53d4741e0aa815f17575e145c3f543fbbf9009c769", 0x36}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)}, {&(0x7f00000014c0)="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"/306, 0x132}, {&(0x7f0000000200)="f6e9d4b70a925a2bc614ce6add72b0c5dff1e4576b795d86816695af43143a79134bd74d3a10ef78e88d0d2126c428435e732b442ed629ecfc210583c52d", 0x3e}], 0x3, &(0x7f0000000280)={0xb8, 0x108, 0xffff0000, "f320f9b800e7efc7e3abd23b8bfc5782aa65eb5d1db53404b1fad059097d3a41a54f75cb0d6b6539fba35c8de4bb8fe59d02d18a41a4eab7d5c349ce4bc5e7c86c6b577f15a803fbd0008b8ae76d38982d3cf5fc8eea264698dae7093494cef04ab76958287076b48aa22c08a830b6273c10673c8313435bb0880048f988a3ff0153eaaab51e495761c24e6a0484a51cc2f492a62d5dfad47e7ee5e0ba272a5b2041ce"}, 0xb8, 0x404c0d0}, {&(0x7f0000000340)={0x27, 0x0, 0x2, 0x3, 0x2, 0x80, "f1bc9b14fe584f3460c8fdd0915199b4609f503bf8ae225e1cf3ff439df031962e565d730d61a1f75b20faefbc9050318044ba2f6498211df9c0731ff42b8d", 0x1}, 0x60, &(0x7f0000000b80)=[{&(0x7f00000003c0)="1c866944b9c6ccfc6f00642096df114aac6505bf87e89142b24e65acf59516664825d9c72bfcab7e06a451ec6c52ee24177c877fcb8d8e296a65755d6795d090e68ee4bc137f1046d85c60aa4bf92d7bfcc7bc58c85540fa85553505d4995d5e76914a78a3510448f9ad45a22b7ce2a085ea822ccef2446ae388f6455692e29f13c1d72f7d82fab165820a0cadcc334635713ddc3e0a4c22a0e455228cbf270ae78a213e77d044d305d6142aa60d515e723592ee4bb0836a3b1e08ad063c156a7fe951e3eaf658871d765ccee39b3f112736b03a7d37925229d3e49bb90bddb051172f2880020d6806688d670b298bd7616c", 0xf2}, {&(0x7f00000004c0)="659c25a8c11fa2848e6fb7342fa5a07eeda9aa9b989aa42ff36da6b744cac8b7e40a", 0x22}, {&(0x7f0000000500)="ed60419c63d6771531067d92bbc445a9cb2a04822db95a681e92c712eb7261b1778c7869aa70ce7c68e59c81c193db6536cf67e4cf12363503afc97fe449417bb9ee8e06881318ff99479a6c40f8cf499e0450998026cbe1e9c98d4c55ff19f939d08998b47acdc2e07ebab8188a02be700079ea61d2e9cb2b3057eef8ae3c07ae13b4dd825b8245d97a60514da8d228e59d1b1562260c3a", 0x98}, {&(0x7f00000005c0)="951a9b35c8247e2e2bb36e2066c7391ba9aa57e8b903e9672e66718bc0b8a98956b4f5d799d70e0ee7b3f8db834b1a49967b2e60605be32e4dbf2088851bd12eeabd9c8d8030e56f25fd26c318167c7d43195a788366e0ddba9a86e249fb975c1901a802eacdfa6d2dc3fff750f82a67082003aaf5f70a5440e000c7a8ab5f5cda06c925e7a0274afe72e94aab9a9fd782424f0b83cf714deb899f9c5baf7e410c0b6bb598071c1be6d7eb98a07abc76967b544aa69c4fcda05035781dbe212f2baef24734f694996600c94ba5a915c539ca5ba46ae6a52277bdcbf75541ab0c49e283f0781cd7954a7b4760ce873eaf6734d0", 0xf3}, {&(0x7f00000006c0)="f90ce2597f233f9da1cfa14cd3fd072db9367974d9b856b3181df8de13497b6a50fa10cb3858a293962b5f138edfdffe5a7b49cd7a3362ef362b84071977e2a585db422ee86a1960892596b81c13b582e8a25658a6aba9c392a172bec372a2abd6f3c1836f5c5607612c00ae547980306c1df2251970342de58db5a01f1f5fb9b096ac3eeb35a88a7562f95a4ad68e90b01531f13118f6d12b626a430c31b24eab50d5d6d456a0dbbd0573a7ea112a2553ff", 0xb2}, {&(0x7f0000000780)="ce41fb2d6ceab7a7044f3d370f888c8e2f636831a181924dec3806ddec3077c84baa233cb3ebeff49b135ffa17c6205b316a387128b1ab2b0d1bf75f0fcde88b485f3ade2dcedcbee8264883bc645cb27d647d51bd94b1764cc48a400095f5727ebc86380d0f9a1b1c9c0b7e52b79f3fbba11f416472f7f70d824bf3e8ae8b99fb38214e4e44ea154d50df7845dd1bb7455e9247242433442126f55a635d9db02d4493c0db723e8b44f8539dfd047c64e12075b728bb0ef38b9720da02", 0xbd}, {&(0x7f0000000840)="d6238f220ad758970d7d69979a8364b0da28deb73b41aa78b9f66dc8974aa5196e81c3d40cdd28baaa3272befed5527ab733c7ff161f06d08d6198bed14dfc9aec6c1c59001ecd206e770b020e99438507c9d958466d93ba91d14aaa64d38784de288dcf3ac2843c42e3425a1ecc313f71f60a8017bab415db3b3aaaf989b06a06cc090ff36a01b6aedc8c444b986c85e7f8dd7beb39399256f042636a9350f552f721f3", 0xa4}, {&(0x7f0000001600)="fc1ce81458e151cb6e8f3ddeb663bc02e1501230a4e45380eae564b6e57a2fce9bf22c21054964a2afef3ce42e9731c7da8e692874c2c0247c85cc9d41ae59f43fe0d31f768fbcddc1f0cbe5636227463c9272b18a1672de34ba953993af06ce576ef5e71bebcddf884769b9bb821e6537760cd7e5e067fd9712ca5e0906435b215a5e7c490bc5321033cf0be86bc4f93b6f2c1a1415567bfd247ac66972d4e3797339388b8055bd58f0f3ce485aaee6116afcee7247a19fe428f533b3b3b934af660de78db2194b81e157a3bebd2c699eefc9940c5bcbd294588c10fe493542226ceb5ac6e6c72a60fb491dc3ac7f62f512c45635269d5f2bc6d024c8604dcf1cb041818506e6353ba512c3e1f85d3d77aca861ccf4477d5ed9b8330ae1db83a8c0acd0e3d20641cfb2bf00094378e202fe0078995239bb5465e510c3edad886f2e46d130334f34f9", 0x149}, {&(0x7f0000000a00)="890f829b5413e1d4308c01ee553bc7e3254966a2e03ee1932752ecf6228058ba29c3747a86d53423c6008858191619b37991a152b09ef4b00d476b05aeb2551dd5de97265bdbb75a53363b5431c3e1291b11fc74f0af01d6ede4d91f73a2e1021d5ad560cf41046a141f98322e5b7d7603f373fc4362d89ef00441b5b299d6dad69d05a6fddcd9bae9d0ca7667dac168b708ff6c34b38856841cc2fc1f42f6a511832d6f877c474fb8dfa6a8766054c68fe75baa4f3e33c3c9181991ba5d1d9a32ef2481c86e1193133a31b0f9937c8016d91fb24580c40b377eab59e38edc97eceb", 0xe2}, {&(0x7f0000000b00)="46a98713192bfdbc2d3fef3daacdf24fb68d3d91932dde8ab57dfd42388cf12b54475fe8b9d87c6a4973263c892d4fbbc28aecd73f2645735d04a03b6cb7f95c710f2b3e8c25747a01a9e68a6385f9b6c8b8767ee4cdba978b0d2334904b5667", 0x60}], 0xa, &(0x7f0000000c40)={0x40, 0x84, 0x8, "c94898dd0ab8449e9ecfa7d919bbbfa5064b360646a0443a57782a14c59a03f60593be5cec2a18c2f57064a1"}, 0x40, 0x20000080}, {&(0x7f0000000c80)={0x27, 0x1, 0x1, 0x5, 0x6, 0x70, "c21db0cb47dde779a40f93e6c0dd22ae68506752f69c846a662c3929f20fa1e6e2b1e44de08af7c675f2562de1f5f3d83764f9affe08103940fd363b98f785", 0x2f}, 0x60, &(0x7f00000011c0)=[{&(0x7f0000000d00)="3ba1282f03d9baa525d01ede5e0df0fc4bd7a96fc72dbfe2a851a6eaa9dcaf304467b50d6f6b9e8d80eb690e96d45a3d426f96389f965c626f14cd72daf92d92b407495445ab76bd910c962fe332a76a47d654f89154819b", 0x58}, {&(0x7f0000000d80)="f5cc04cdce2f8f1feb12", 0xa}, {&(0x7f0000000dc0)="c2b9dad62e227a97076dae649dacbedee9d1a08c25e3a1fce1090ca82b74e8dac796274e9bab6d80c3c66a7f1993900ff0194b4e8a7bba7213edceba6014d1448350afda0574f5b4d46b577728affaba233863a9a808da8032b893c32a7649980a94a466508a5aa62dedbc20ad64b2d36487ea29cae0e8dd302d9cee5204bf81a1e88e953c919c4fc9f43288f3cfb2f14eca7a7570eafba9b43f3a052b38721211b8b31405ece79b6abecf97b780200a5e0477c755", 0xb5}, {&(0x7f0000000e80)="8c323253bf066182acc06a38a407f94962338b36d5de7c32a1bb1d19082a50db531c8f487d205b6799edc0265668d5c57e9faf00b48c54fdd1aa3893ec117296a8f2a4474748e1be2ce1fde97f8181cb11671c111667848f9e7b9156407796a0d3919bfe1f6036aab628f7e60082e841384dc005059d84131854bc9cc99c54530b274c6436e14c078dd5e706e61688dea7a4392422ebeeff9e8921cb4abaf354e09db4f05532683e59c1070b83c1c49a263803caca71", 0xb6}, {&(0x7f0000000f40)="620dcf7b16245e9d33807a7d998ecb965af84eca8979430a97dc12cbe77ac8c5773f5136d390290f1ac106ca53a0b419a340c06ec601a1400379014dee5522dd59959b8ea9fb7a822a9bf2461fd0885c54a0fb31bbeb9be07e41d439a2b745cf8c4b62fe1af9507643297f0f0c4275e2a0c32d5348278616ec14143339acf658b1d469184dc01067a6cfb3da6e317aceef8996a0dc0dbd6e51616b74062b8910d3cba6c52fb2c632c6758c7db4f5047b0789282a9bb5d9106ac93b947cc2a6bf839bd1df2e149c4981a206b17b5a1520ae83a0", 0xd3}, {&(0x7f0000001040)="9b29601fdeb8", 0x6}, {&(0x7f0000001080)="d698cab30ab3e4b76ec78f4c6151a1b0b878604feec452fbc28e02519c1311510ff94e2cee24bea5a332e12e3eb24bde24fab0a87ae896e72407b3990d0da87fe4e1a983ca85fc8d31d8523c269d2bfd18745245c52b8865956792e9b5c50dc3ec7d4de9c948473359d4c7a477968660b782bfe625e95029683f4b4856f9f2340f477d6bdb1a981cc87d6c93d8f823592e5e2288f49b6ac244", 0x99}, {&(0x7f0000001140)="4fc2fe91405c1533184ef2dbc651f2404da54bbeaf0bc5da55ffe82a", 0x1c}, {&(0x7f0000001180)="8633fb78907e45b7de5501939aefa1a42072d589d74a7a0c70adbf7814f9befc4a6afae796c0982192527b7609f59fb2475befe45b937faaf239b5f3923c", 0x3e}], 0x9, &(0x7f0000001280)={0xb0, 0x18, 0x2, "75a97bd4814a358b7ef51f8ad9a6b3e5e1402b4acfa1c78565268c5d8c22b2d3bec77a07e04eafd666f7f26438e6cbc2c66432e0967a44cf3ba20e716be97b5a153655cce78f995263a3316afd7428159cca873a3f9cffb87f68024958e71c1d036685f488d0ab8de26d6c5c9e92158e245ac2c4513afc4a47ed5ce8bac8e2e5c4898f089648f5555da2b3a590387b52c1e8d06eaf585c84c57a"}, 0xb0, 0x8000000}], 0x3, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fanotify_mark(r3, 0x80, 0x1, r5, &(0x7f0000000180)='./file0\x00') mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_GET(r7, &(0x7f0000001480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB="280000000114000408007000fb19df2508000100020000000800"/40], 0x28}, 0x1, 0x0, 0x0, 0x4008800}, 0x0) 21:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1204}]}, 0x1c}}, 0x0) [ 1272.889294][T23681] 9pnet: Insufficient options for proto=fd 21:38:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000003000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1273.254697][ T27] audit: type=1804 audit(1597095513.400:169): pid=23662 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1783/file1/bus" dev="loop3" ino=218 res=1 errno=0 [ 1273.283751][ T27] audit: type=1804 audit(1597095513.420:170): pid=23662 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1783/file1/bus" dev="loop3" ino=218 res=1 errno=0 21:38:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x50) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1228}]}, 0x1c}}, 0x0) 21:38:33 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:38:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000004000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x8) 21:38:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x2000) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:33 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:38:33 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) [ 1273.383310][T23711] 9pnet: Insufficient options for proto=fd [ 1273.399778][T23714] __nla_validate_parse: 13 callbacks suppressed [ 1273.399785][T23714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000005000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000008000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:33 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) [ 1273.482556][T23723] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1273.515102][T23724] 9pnet: Insufficient options for proto=fd 21:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x124c}]}, 0x1c}}, 0x0) [ 1273.561764][ T27] audit: type=1804 audit(1597095513.700:171): pid=23731 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1784/file1/bus" dev="loop3" ino=219 res=1 errno=0 [ 1273.700456][T23741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1273.746527][T23743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1273.764040][ T27] audit: type=1804 audit(1597095513.710:172): pid=23731 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1784/file1/bus" dev="loop3" ino=219 res=1 errno=0 [ 1273.788990][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1273.903533][ T27] audit: type=1800 audit(1597095514.000:173): pid=23706 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="cgroup.controllers" dev="sda1" ino=16364 res=0 errno=0 21:38:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x50) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:34 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) 21:38:34 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000009000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1270}]}, 0x1c}}, 0x0) 21:38:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:34 executing program 5: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, 0x0, 0x8) [ 1274.426570][ T27] audit: type=1804 audit(1597095514.570:174): pid=23766 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1785/bus" dev="sda1" ino=16339 res=1 errno=0 [ 1274.435236][T23769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000f000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1274.475518][T23773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1274.514427][T23774] 9pnet: Insufficient options for proto=fd 21:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1294}]}, 0x1c}}, 0x0) 21:38:34 executing program 5: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, 0x0, 0x8) [ 1274.539160][ T27] audit: type=1804 audit(1597095514.570:175): pid=23766 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1785/bus" dev="sda1" ino=16339 res=1 errno=0 21:38:34 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000014000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1274.672143][T23785] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1274.737787][T23790] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1274.751426][T23791] 9pnet: Insufficient options for proto=fd [ 1274.812453][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:35 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x50) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:35 executing program 5: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, 0x0, 0x8) 21:38:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x12b4}]}, 0x1c}}, 0x0) 21:38:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000034000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r5) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x40000, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x6}}, {@blksize={'blksize', 0x3d, 0x1600}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_gt={'euid>', r5}}, {@uid_eq={'uid', 0x3d, r6}}, {@uid_gt={'uid>', 0xee01}}]}}) r7 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FICLONE(r1, 0x40049409, r7) chmod(&(0x7f0000000000)='./file0\x00', 0x40) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xaa, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1275.404007][T23804] 9pnet: Insufficient options for proto=fd [ 1275.432030][T23811] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000048000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 21:38:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1275.523454][ T27] audit: type=1804 audit(1597095515.670:176): pid=23814 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1786/file1/bus" dev="loop3" ino=220 res=1 errno=0 [ 1275.559349][T23821] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1275.612703][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000060000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1275.852280][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x50) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x12d8}]}, 0x1c}}, 0x0) 21:38:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 21:38:36 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000068000000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000080000001"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000000)={0x1f, 0x25, 0x5, 0x0, 0x5, 0x85, 0x8, 0x80, 0x0, 0x80, 0x2, 0x40, 0x0, 0x81, 0x7, 0x0, 0x81, 0x6, 0xb1, [], 0x3, 0x4}) 21:38:36 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x12fc}]}, 0x1c}}, 0x0) 21:38:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000052010000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 21:38:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000030000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:36 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1276.894232][T18314] net_ratelimit: 1 callbacks suppressed [ 1276.894239][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1276.908039][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1276.908572][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x131c}]}, 0x1c}}, 0x0) 21:38:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 21:38:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000050000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r2, 0x8008f512, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$uinput_user_dev(r4, &(0x7f0000000200)={'syz1\x00', {0x0, 0x8000, 0x41f8, 0x4}, 0x11, [0x1, 0x200, 0xac5, 0x4, 0xe7, 0x4, 0x8, 0x2, 0x5, 0xfffff000, 0xb31, 0x7, 0xffff, 0x2, 0xf74, 0x4, 0xb9e2, 0x9, 0x101, 0x20, 0x2, 0x7ff, 0x0, 0x3, 0x7, 0x1, 0x16, 0xfffffff8, 0x652, 0x9, 0x4af2, 0x35, 0x6, 0xfffffffc, 0x8, 0xffffffff, 0x3, 0x665, 0x4, 0x6, 0x2, 0x1, 0x8000, 0x641, 0x4e, 0x8, 0x3a99, 0x6, 0x6, 0x43b9, 0x1, 0x9, 0x3ff, 0xfff, 0x6, 0x6, 0x4, 0x1, 0x7fffffff, 0xffff0001, 0x400, 0x10001, 0x10cf, 0x8], [0x9, 0x3, 0xfffeffff, 0x4, 0x5, 0x2, 0x6, 0x10000, 0x1, 0x0, 0x0, 0x2, 0x6, 0x9, 0x523, 0x8, 0x10001, 0x4, 0x800, 0x7f, 0x5, 0x0, 0x800, 0x3, 0x8, 0x8, 0x0, 0x4, 0x4, 0x80000001, 0xffffffff, 0x200, 0x6, 0xf2, 0x5, 0x9, 0x0, 0x3ff, 0xc0, 0x6, 0x89, 0x80000000, 0x400, 0x40, 0x7fffffff, 0x6, 0x3, 0x0, 0x8, 0x7, 0x80000001, 0x4, 0xfffffffa, 0x7, 0x2, 0x0, 0xd4, 0x4, 0x7, 0x1, 0x0, 0x6, 0x1, 0x3f], [0x0, 0x9, 0x4, 0x4, 0x80000001, 0x456b, 0x18000, 0x2, 0xb646, 0x73, 0x3, 0x8, 0x7, 0xfeac, 0x9, 0x1ff, 0x800, 0xfffffffa, 0x9, 0x7, 0xae, 0x3, 0x1ff, 0x800, 0x6, 0x2, 0x2ac, 0x101, 0x81, 0xfffffffb, 0x2, 0x6, 0x8, 0xffffff01, 0x4, 0x6, 0xacdf, 0x9ab2, 0x7, 0xfff, 0x4, 0x4b8, 0x1, 0x7ff, 0x1f, 0x8001, 0x0, 0x7, 0x3f34, 0xd4b, 0x7fffffff, 0x40, 0xd18, 0x74, 0x1e, 0x5, 0x9, 0x8, 0x4, 0xa5a4, 0x5, 0x9, 0x1, 0x358c3664], [0x10000, 0x6, 0xffff, 0xe79, 0x6, 0x1, 0x8002, 0x401, 0xfff, 0x8, 0xe48, 0xb4, 0x5, 0x1, 0x7fff, 0x7, 0xfffffff9, 0x101, 0x7ff, 0x5, 0x1, 0x8, 0x6def5d4f, 0x2, 0x2, 0xfa2, 0xff6f, 0x8, 0x40, 0xe3a, 0x89a4, 0x30a, 0xe01b, 0x9, 0x8000, 0x2, 0xfff, 0x8, 0x7fff, 0x1, 0x6, 0x8, 0x9, 0x5, 0x61ad, 0x0, 0xd60, 0x5, 0x5, 0x9, 0xcaea, 0x5, 0x7, 0x101, 0x1, 0x10000, 0x1000, 0x7, 0x9, 0x4, 0x0, 0xfffffffa, 0x1ff, 0x9]}, 0x45c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x7c, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1338}]}, 0x1c}}, 0x0) 21:38:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 21:38:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000090000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) [ 1277.533071][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1277.942340][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1358}]}, 0x1c}}, 0x0) 21:38:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 21:38:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000f0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x0) 21:38:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x400, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@null, @default, 0x0, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) ftruncate(r1, 0x80000001) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1278.153225][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 1278.153238][ T27] audit: type=1804 audit(1597095518.300:181): pid=23924 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1788/file1/bus" dev="loop3" ino=222 res=1 errno=0 [ 1278.183777][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1278.191905][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x0) 21:38:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) 21:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1374}]}, 0x1c}}, 0x0) 21:38:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000140000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x0) 21:38:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) [ 1278.417139][T23962] __nla_validate_parse: 10 callbacks suppressed [ 1278.417359][T23962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1278.449496][ T27] audit: type=1804 audit(1597095518.590:182): pid=23959 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1789/file1/bus" dev="loop3" ino=223 res=1 errno=0 [ 1278.477587][T23970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1278.892267][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000340000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) 21:38:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r2, &(0x7f0000000000)="6af15c114be0449646ad6feec256f4fb666474e9d3fef0ac2299fc80785ef56a3f8e687425287748a69a3e6ca8fe8ac7c37981e292ccfd61b13dbdf9b7f62b2f720d99418cbbe784dcb5481a83a919849bec06c6d322fbc80730b2aef48d6ed761549e841212a8ee8129d57cfc1461abd5a7b068b6c0df754b4c9802273ffea3d21f1528ff515a426c1df308fe44e92408eac6e48582604b481426077726fcb6a910fdae038095b485abc4eec30592b6eaed4de39079471660a77529a80abb2587359cda73", 0xc5, 0x40000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x138c}]}, 0x1c}}, 0x0) [ 1278.972344][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1279.045164][T23989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1279.095458][ T27] audit: type=1804 audit(1597095519.240:183): pid=23987 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir202963355/syzkaller.gKXzLf/1708/file1/bus" dev="loop5" ino=224 res=1 errno=0 [ 1279.133724][T23995] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000480000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x13ac}]}, 0x1c}}, 0x0) [ 1279.266751][ T27] audit: type=1804 audit(1597095519.410:184): pid=24000 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1790/file1/bus" dev="loop3" ino=225 res=1 errno=0 [ 1279.308310][T24002] 9pnet: Insufficient options for proto=fd 21:38:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000001520000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1279.414262][T24010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:38:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000600000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1279.527155][T24016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1279.617034][T24019] 9pnet: Insufficient options for proto=fd [ 1280.012804][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 21:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x13c0}]}, 0x1c}}, 0x0) 21:38:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000680000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x21100, 0x0) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000100)='cgroup.controllers\x00', &(0x7f0000000140)='./file0\x00', r3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5, 0x1a, 0xc, "7b9d4413b8ff3ff926b977d4cc057f7e5c452d565e4d3d8128031b43090d580b383cf1a82abee20029e3b3798f7b23e0d8d479ca984d0724516fdbf33984c953", "2ba50562f70edcc1d00cd1ddd1e7d182ce4608b8338f8cc106b77d8e0e24d99f6aeacb75a7429e4a5dd66fa229b9520cdb0f35edbf98b87d48f010926a1b9b9d", "944c431cd0fb195fbdfe49cfae8e26560fce16e1a449323f96f42d44330ee2c3", [0x0, 0xdd6]}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc000, 0x0, 0x0, 0x0, 0x1}, r4, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 1280.147910][T24034] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1280.147994][T24036] 9pnet: Insufficient options for proto=fd [ 1280.169070][T24038] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x13d8}]}, 0x1c}}, 0x0) 21:38:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000400300000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1280.215039][T24044] 9pnet: Insufficient options for proto=fd [ 1280.230875][ T27] audit: type=1804 audit(1597095520.370:185): pid=24040 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir202963355/syzkaller.gKXzLf/1709/file1/bus" dev="loop5" ino=226 res=1 errno=0 21:38:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 1280.384553][T24057] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1280.415038][ T27] audit: type=1804 audit(1597095520.540:186): pid=24052 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1791/file1/bus" dev="loop3" ino=227 res=1 errno=0 [ 1280.484333][T24063] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000034000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1280.540852][T24064] 9pnet: Insufficient options for proto=fd 21:38:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_mount_image$nfs4(&(0x7f0000000100)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x26f1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="7a9d45ac3e6663017e19105129f5e941f0953ee4804c47d07ac2b82419b368612ee10fdd9e05f9fa524766cd4b89bac9a458f38a86c204bbfa02ccc82584464a463db7ba7ef1b3666104aa2ca09ddedaf7ee040baa347c8c8005ab0a63f8c43c34ec369b8a714246577436561cea435542d86da78eee73bfe16e7d30c58fe6", 0x7f, 0x40}], 0x8, &(0x7f0000000300)='\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000380)=0x3) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x81000000}}]}]}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) bind$can_raw(r3, &(0x7f0000000040)={0x1d, r6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f00000003c0)={0x1, 0x0, [0x0, 0x6, 0x3, 0xa42, 0x3, 0x80, 0x0, 0x1]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:41 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x13ec}]}, 0x1c}}, 0x0) 21:38:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 21:38:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000001000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000000)={{0x2, 0x10000, 0xd, 0x9, 0x8, 0x9, 0xe5, 0x81, 0x8, 0x2, 0x7, 0x9b}, {0x806, 0x2, 0x9, 0xb7, 0x1, 0x20, 0x2, 0x5, 0x2, 0xff, 0x1, 0x3}, {0xd000, 0x10000, 0xb, 0x6, 0xf5, 0xff, 0x4, 0x7f, 0x9, 0x8, 0x8, 0x1}, {0x6000, 0x6000, 0xe, 0x9, 0x1, 0x7, 0x4, 0x0, 0x4, 0x8, 0x8}, {0x1000, 0x0, 0x0, 0x5, 0x80, 0x4, 0x9, 0xff, 0x2, 0x81, 0x2, 0x8}, {0x1000, 0x11f000, 0x3, 0x9, 0x3, 0x1f, 0x0, 0xb1, 0xff, 0x9, 0x3f, 0x8}, {0x0, 0x100000, 0x8, 0x2, 0x7, 0x1, 0x20, 0x0, 0x9, 0x67, 0x7, 0x1f}, {0x5000, 0xd000, 0xb, 0x0, 0x5, 0x1f, 0x5, 0x7f, 0x4, 0x0, 0x0, 0x6}, {0x4, 0xffc0}, {0x1, 0x8}, 0x2, 0x0, 0x2, 0x402020, 0x3, 0x7000, 0x1, [0x8000000000001, 0x400, 0x9, 0x10000]}) 21:38:41 executing program 0: dup(0xffffffffffffffff) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40811001) readv(0xffffffffffffffff, 0x0, 0x0) 21:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1400}]}, 0x1c}}, 0x0) [ 1281.331166][T24090] 9pnet: Insufficient options for proto=fd 21:38:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000002000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1281.453035][ T27] audit: type=1804 audit(1597095521.600:187): pid=24102 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1792/file1/bus" dev="loop3" ino=228 res=1 errno=0 21:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1414}]}, 0x1c}}, 0x0) [ 1281.511218][ T27] audit: type=1804 audit(1597095521.620:188): pid=24089 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir202963355/syzkaller.gKXzLf/1710/file1/bus" dev="loop5" ino=229 res=1 errno=0 21:38:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x2, [@const, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {0x5}, {}, {}]}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:38:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000003000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1281.698560][T24117] ptrace attach of "/root/syz-executor.0"[24116] was attempted by "/root/syz-executor.0"[24117] [ 1281.933430][ T9109] net_ratelimit: 4 callbacks suppressed [ 1281.933437][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1282.103326][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x142c}]}, 0x1c}}, 0x0) 21:38:42 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5013, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x49, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1dc}}}}]}}]}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @ipv4={[], [], @broadcast}}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000140)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="ec0f6803"], 0x0, 0x0, 0x0, 0x0}, 0x0) 21:38:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000004000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r0, r1, 0x0, 0x8) 21:38:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000040)=0x275) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000000)=0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000005000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x144c}]}, 0x1c}}, 0x0) [ 1282.425388][ T27] audit: type=1804 audit(1597095522.570:189): pid=24141 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1793/file1/bus" dev="loop3" ino=230 res=1 errno=0 21:38:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_script(r2, &(0x7f0000000040)={'#! ', './file0', [{}, {0x20, 'cgroup.controllers\x00'}, {0x20, 'cgroup.controllers\x00'}, {0x20, '-.)['}, {}, {0x20, '\x12'}, {0x20, 'cgroup.controllers\x00'}], 0xa, "958d84ad6902ddc34e"}, 0x59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2002, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xc, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000008000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x146c}]}, 0x1c}}, 0x0) 21:38:42 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000180), 0x0) [ 1282.610641][T24166] input: syz1 as /devices/virtual/input/input29 [ 1282.614056][T12097] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1282.653279][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1282.661821][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1282.892310][T12097] usb 1-1: Using ep0 maxpacket: 16 [ 1283.012251][T12097] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 1283.030731][T12097] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 21:38:43 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000009000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1283.057587][T12097] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1283.068738][T12097] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 1283.092770][T12097] usb 1-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 1283.101865][T12097] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1283.113701][T12097] usb 1-1: config 0 descriptor?? [ 1283.132381][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1283.140889][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1283.149645][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1283.161121][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1283.224254][ T27] audit: type=1804 audit(1597095523.370:190): pid=24191 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1794/file1/bus" dev="loop3" ino=231 res=1 errno=0 [ 1283.293487][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1283.586725][T12097] input: HID 0458:5013 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0458:5013.0003/input/input31 [ 1283.600453][T12097] input: HID 0458:5013 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0458:5013.0003/input/input32 [ 1283.696019][T12097] kye 0003:0458:5013.0003: input,hiddev0,hidraw0: USB HID v0.00 Device [HID 0458:5013] on usb-dummy_hcd.0-1/input0 [ 1283.791488][ T9109] usb 1-1: USB disconnect, device number 4 [ 1283.932479][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1284.552232][T12097] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1284.802234][T12097] usb 1-1: Using ep0 maxpacket: 16 [ 1284.922429][T12097] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 1284.934625][T12097] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1284.945728][T12097] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1284.955758][T12097] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 1284.968808][T12097] usb 1-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 1284.977975][T12097] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1284.986801][T12097] usb 1-1: config 0 descriptor?? 21:38:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x148c}]}, 0x1c}}, 0x0) 21:38:45 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000180), 0x0) 21:38:45 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000000000000f000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:45 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) [ 1285.307458][T24243] __nla_validate_parse: 11 callbacks suppressed [ 1285.307520][T24243] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1285.328574][T24251] input: syz1 as /devices/virtual/input/input33 [ 1285.342242][T12097] usbhid 1-1:0.0: can't add hid device: -71 [ 1285.348209][T12097] usbhid: probe of 1-1:0.0 failed with error -71 [ 1285.360673][ T27] audit: type=1804 audit(1597095525.500:191): pid=24246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1795/file1/bus" dev="loop3" ino=232 res=1 errno=0 [ 1285.425278][T12097] usb 1-1: USB disconnect, device number 5 21:38:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f0000000300)={@void, @val={0x3, 0x3, 0x0, 0x1000}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @private}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @private}}}}}, 0x3a) [ 1285.477455][T24265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000014000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x14ac}]}, 0x1c}}, 0x0) 21:38:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[], 0xff36}}, 0x0) 21:38:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1285.657337][T24284] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@allocspi={0xf8, 0x16, 0x311, 0x0, 0x0, {{{@in=@remote, @in=@broadcast}, {@in=@private, 0x0, 0x6c}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0x5}}, 0xf8}, 0x8}, 0x0) 21:38:45 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) write$evdev(r1, &(0x7f0000000180)=[{{0x77359400}}], 0x20000198) 21:38:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000034000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1285.751981][T24296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1285.865726][T24307] input: syz1 as /devices/virtual/input/input34 21:38:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x14cc}]}, 0x1c}}, 0x0) 21:38:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000048000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1286.056894][T24314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) gettid() r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x200400) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xe00, 0x0) r4 = getuid() ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4}) r5 = fcntl$dupfd(r2, 0x0, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$ppp(r7, &(0x7f0000000100)="b66c3e316a28509826c66b0482e28a54579f74c005657afd1e1ee25e19e8441f8b7745d925a7baa08ca871469a6a0e08d2b972e2c679813a79af09c61a7ea883e1489ceffead7160563061febaaa6907906cf4a9082cd8aa0e9a52487a051fdf4631a22a21b24aa2bf2deb0a1284ee77acdd09c95356d37b11c8fccb8b09e35f1e75dcd8ca56592ae938b133095c5a3cdbcde9", 0x93) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25GETINFOOLD(r5, 0x89e9, &(0x7f0000000040)) [ 1286.125488][T24319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000152000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x14ec}]}, 0x1c}}, 0x0) 21:38:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000060000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1286.386872][T24336] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1286.410598][ T27] audit: type=1804 audit(1597095526.550:192): pid=24335 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1796/file1/bus" dev="loop3" ino=233 res=1 errno=0 [ 1286.546834][T24345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1286.683376][T24346] input: syz1 as /devices/virtual/input/input35 [ 1287.292570][T12097] net_ratelimit: 6 callbacks suppressed [ 1287.292577][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:47 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x181281, 0x0) write$tun(r0, 0x0, 0x0) 21:38:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000068000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x14f0}]}, 0x1c}}, 0x0) 21:38:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) dup2(r0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000000)={[0xffffffffffff75a4, 0x0, 0x5f4, 0x9, 0x101, 0x8, 0x81, 0x0, 0x1, 0x40000000000000, 0x3, 0xfffffffffffff001, 0x6, 0x835, 0xb220], 0xf000, 0x91444}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:47 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) [ 1287.729097][T24367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1287.758665][T24372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000ffffff9e000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000010005fba000000000000000024000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f00000019c0)={@void, @val={0x0, 0x0, 0x2}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @private}, @timestamp={0x11, 0xe0}}}}, 0xfdef) [ 1287.772664][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1287.798718][ T27] audit: type=1804 audit(1597095527.940:193): pid=24374 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1797/file1/bus" dev="loop3" ino=234 res=1 errno=0 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1504}]}, 0x1c}}, 0x0) 21:38:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000ffffffef000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1534}]}, 0x1c}}, 0x0) [ 1287.922048][T24384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1287.933784][T24384] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1558}]}, 0x1c}}, 0x0) 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1578}]}, 0x1c}}, 0x0) [ 1288.022259][ T5057] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1288.028172][T24384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:38:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1288.117090][T24384] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1590}]}, 0x1c}}, 0x0) 21:38:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000fffffff0000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1288.332340][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1288.340904][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1288.412677][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1288.421206][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1288.421473][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x15, 0xa, 0x201, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 21:38:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000007fffffff000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1594}]}, 0x1c}}, 0x0) 21:38:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_vlan\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4008000, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:38:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a0000009effffff000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x15a8}]}, 0x1c}}, 0x0) 21:38:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1288.777016][ T27] audit: type=1804 audit(1597095528.920:194): pid=24439 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1798/file1/bus" dev="loop3" ino=235 res=1 errno=0 21:38:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x15cc}]}, 0x1c}}, 0x0) 21:38:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x15, 0xa, 0x201}, 0x14}}, 0x0) 21:38:49 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000efffffff000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x15ec}]}, 0x1c}}, 0x0) 21:38:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) r1 = socket(0x11, 0x2, 0x0) r2 = socket$inet(0x2, 0x3, 0x7f) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000540)={'vxcan1\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100)="0eead6c4", 0x4, 0x0, &(0x7f00000005c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 21:38:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x160c}]}, 0x1c}}, 0x0) 21:38:49 executing program 5: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000050060000000f000000001d6b00047b0000000400002100000900020073797a30"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000004060102000001007948ff8000000b000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 21:38:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000f0ffffff000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1289.768799][ T27] audit: type=1804 audit(1597095529.910:195): pid=24479 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1799/file1/bus" dev="loop3" ino=236 res=1 errno=0 21:38:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1624}]}, 0x1c}}, 0x0) 21:38:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000001000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1289.960210][ T27] audit: type=1804 audit(1597095530.010:196): pid=24491 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir202963355/syzkaller.gKXzLf/1722/cgroup.controllers" dev="sda1" ino=16374 res=1 errno=0 21:38:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1628}]}, 0x1c}}, 0x0) 21:38:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r2 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r1, 0x536ae464467e3929, 0x0, 0x0, {0x25, 0x0, 0x6800}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000001340)=ANY=[@ANYBLOB="befc54b082f9eb9a22ff8f410651137c1e3120549ced03236f16d9b3de59a1fa069e41055d3830036bd36d2925fd68b72324af6a61395b02959b7820c2a40333c23e8de3b213d3bf8e115799ec2651d3cf9f18be5ba54b4a1b755007b5bd58110521e89d63079af0c2f6b77643a9c0f82e78c21bd96060dd51347a9b659b99557469a65a14c7f28dd56c626e11f5d840fc4bec654bd530a748427e40d7709e24878e9be72336bbb5d939513bf7a01f1fb012ae3c884d337d95cf3f81af8924f27e", @ANYRESDEC, @ANYBLOB="16e5c4b5a2874ce2a7fa8697671e490006616a218c541aba7f9da44aab129f4ebf20ce987bce4479bbf2a82cf9bba247e240dc0c"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x7, &(0x7f00000000c0)='cgro\x01p\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) 21:38:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000340000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080ffffff7e) 21:38:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000010000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1290.615549][T24512] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:38:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080ffffff7e) [ 1290.705924][ T27] audit: type=1804 audit(1597095530.850:197): pid=24527 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1800/file1/bus" dev="loop3" ino=237 res=1 errno=0 [ 1290.767502][T24512] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:38:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000020000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080ffffff7e) [ 1291.007581][T24512] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:38:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000030000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:51 executing program 0: r0 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080ffffff7e) [ 1291.251868][T24512] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1291.347706][T24512] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.428538][T24512] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 21:38:51 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) 21:38:51 executing program 0: r0 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080ffffff7e) [ 1291.476519][T24512] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.528487][T24512] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.552758][T24525] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1291.603977][T24525] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1291.675856][T24525] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1291.763855][T24525] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1291.839189][T24525] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.852085][T24525] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.870934][T24525] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 21:38:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x163c}]}, 0x1c}}, 0x0) 21:38:52 executing program 5: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x11}]}}}}}}}, 0x0) 21:38:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000040000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:52 executing program 0: r0 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080ffffff7e) 21:38:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) [ 1291.886884][T24525] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 21:38:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r0, &(0x7f0000001140)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)="f518377a1d70479d6a10101fa397cb3b3a2cdfe6f8b8225f39f962d5c8a19e856ccc8cc29f475544", 0x28}, {&(0x7f0000000140)="391eb4b258bdb8585bcf29512c8762f01b4cfdf7409a4d498a95848499ce2e9a0579e3ce47ea89d237af3ac878f00c02bff58d73ec1e", 0x36}, {&(0x7f0000000200)="8f31ae97c81b31e59a6321f6d6e7f21d384859a4d4112372437d5b5f5a6292c8ceb3be4422d7cf23b03f61469ff5a6f8eb9308cef2a919995b8733512a01c3f576ee6534fa2c88745fdce338088985578924138f03c818f44d1c1e36098b7343da0c82af4f5005d47b085f39d9f160a8102a24126d2db71220942573ea545be2d41c9cc3ce50a75a518228d678792b4bb1bf379d8e1cffe3418f9460f0544cdf593ea8c85cd72639657464c55ebc993c9695a1d094384522c0713f88500c365c97c60426e6bfe37c48f801bfe479ab5014e3f68e", 0xd4}, {&(0x7f0000000300)="518415d3587e4ebc3fb49d766a817e3aa9cfdb30b40664e6d59fe31e3bb8128228edb270e71455acabec61bfa64f48fdf184e4d8d40d39eb82c0cc949e431e50224841a39d895b0d92ea7bb491334908c1dfb4f9b5da6859aba7b4d7fab3b6b953740f60010eaf80b05cf6297f45a10086fb3f23769abccc0eddf1fc129a57bca42226e6e605ccf471e8b66515138ca6926c44faffe45c7a26dc90cb9ce026b79331d4dfd0c26ab472f4e737cd46edf98d124a79902b05478aca38dd67bacab7e886c7865c41e859a60ca5bfa7e54de75e9ed8c16debd73f1d124a755dedcd5df0e2756a2050af9fe0b9029039c0e9", 0xef}, {&(0x7f00000004c0)="cb491d5ffb1d697180f17cf5ed31bb34d3aa3fab3d6aae9b3d6ef835fb11beac2badb96df27bb4989e44fa998285956add0426cd3ede0346e681884cc83126bfb8edaa14f43ca4630fc1f8a0b11dc693236a45a19afb8bca1510c6ab79576fd7fa9a6156e1b7ddbb3ba73bf3246555bed7f59303", 0x74}, {&(0x7f0000000640)="302b4da6284ebb323743564a8ae0e730ea256f1a8c4861f5146e2c4298b8905b3f8b89c42dcc3d5708441dbccdf8e92db9425a392737fee910c8a35561762548da9ad5ed73b04967d2931b7fc668629f05fdb62a7660875514469ba392effabd79306cd793423e16c46a008fe6c640e3ca2034c36ffe41357abc0ecaf95e1b192a95f9c5adf2a1d8f842ae4412b157b00ade15fe6778fb53d8993e3371bbddf1860e44c0cc9c48823d5da923b9d7891b6ed2dbfd1535df524d418c9e0dbad1d4f24166a0d1c0bbeb0acea362e2667a7499e7b715c192ebf297ff403eb74a50d36a6835a8b8842d66be94e24ebe4d", 0xee}, {&(0x7f0000000540)="c1a4e7f09acbdc84aa5319b012216b7b32a6", 0x12}], 0x7}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000840)="55a63ca73d52b3f955f5250cf8e6f342d3ed59380ccace432b540b986ed7e7ce21271459842f0afec93a59a4ab6660874735b2432bb7fe14014ee6d1ab994cb87b6ecfb4d3d4c424cfbfd9a1d1fbdc98aabb8d4e23cbba6a5b1bbf2cc2f28ea2bb64ee1301dec8a325a1c55291636fabbc94c3585de3fd5371aa09b1e3df61092ad3cf89b85f", 0x86}, {&(0x7f0000000900)="b1f0d096818125e3be2eb1e552a0bbbd76e4e9712eb1556a0458812c31e058d7fed68074a1d37ea07ea46f73b15ec6a21cabb57e529f403b89639ce9b3fb661ca7a297749f71f21af2da14b25fb201ddb80e269fd2185a2d3f1dd6ebc04be0861c1bc0f9e923c33134d6d9419d512e04c1ecfb1ac4a29383fd2a0d83e0e641c75b4d9da1c1968b51df426ace85d5260a14a486f8e499aa96b37687f8b1cbd473be8c0dcb47df1aed0602edaaf46a4a2321f0576cc3e2ba1219e7a5f690d68ca017f96a30436167c066da00eae4db2d404e7adf0bf96646a2ad68fbb7803b73be3e1afadb", 0xe4}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000a80)="1179c8bfd4cd9f76dca3196a84497a8312f243acd5897f232f8a3efad897b17bde88980c4582e35ec3d7e64973f3886b3e40b302f09fe9935985d60fb36e1521d688da815a0574373bc15bae7908008d9ea5ebbb9f8d72950553dd63f7bf3ef85e1c34e8e90c69cffb3f50c1884ab7ab8a8daebf53e627e2f63dd9f42887d0c729880daf554294e3ac402a1cc070", 0x8e}, {&(0x7f0000000b40)="95ddd95bc0bdf4262b0325efb9f852597b3afc76cf3231a0650e8499f69c10485cc21b2ea259901640a913355c836553392b175aab6046a0f0cd6196c4a9cc4be6209864e9750e6e2cb9e17a620f94d026241a69073c34610c9869b7647096436b6ae94df7c8e3c13b65d717a561ca594d32cbb7043d0db07f4168af", 0x7c}, {&(0x7f0000000c40)="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", 0xfa}, {&(0x7f00000005c0)="9221d49122acc7d380aa", 0xa}, {&(0x7f0000000d40)="ff2c01230f6e68028ff1dfff80827d753d6c2ae64817986f06c538c41effdb5807f2122e4e4de161eb8010a3b66cfd019eab4fb8c7c8d8b49a3c2b3779f05ef3adb31e13c20a1613ab22875252e5f6abde189d20017f0f6dc8bd6719ab154dcd55b2355c5a355ca03b3e265e3d552679b15b3138c78dca9b92b279b86dbe2717ecd6787a71a9921a53043421d0c3ada3608c115a2032a4858abb33abdce34d3f2d155e01e7f262dc0f018d54ca654a1c4fc346c7e8ab247e8f5f847db8f7b9cbf754385780150df175d352f6e2b6e7fef7e7a37761142896a7c98ca8d44c31c20df2bf257d2171", 0xe7}], 0x5}}, {{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000f80)="ebb22d6bbaf00015ee66203039444353344a83b156600a614767e4bb23765c3170fbb4d90eaf793269d020afca", 0x2d}, {&(0x7f0000000fc0)="1569b33bb070f83600a121c7669187398da69d8b7f7d297f94ab0da950d524d6891a60", 0x23}, {&(0x7f0000001000)="6c15303889e4f926a45a09b48c8b1898a7c5d5e7bd19005671d0f934", 0x1c}, {&(0x7f0000004900)="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", 0x5b6}], 0x4}}], 0x4, 0x0) [ 1292.033815][T24608] __nla_validate_parse: 22 callbacks suppressed [ 1292.033823][T24608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) 21:38:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000050000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:52 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:52 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1292.185650][T24617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000080000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1654}]}, 0x1c}}, 0x0) 21:38:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) [ 1292.337141][T24633] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:52 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000090000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1668}]}, 0x1c}}, 0x0) [ 1292.430019][ T27] audit: type=1804 audit(1597095532.570:198): pid=24639 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1804/file1/bus" dev="loop3" ino=241 res=1 errno=0 [ 1292.526993][T24648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1292.562140][T24651] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1292.590897][ T27] audit: type=1804 audit(1597095532.730:199): pid=24650 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1805/file1/bus" dev="loop3" ino=242 res=1 errno=0 [ 1292.653710][ T1340] net_ratelimit: 10 callbacks suppressed [ 1292.653717][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0200002d00050fd25a80648c63940d0b24fc60100002400a000200051a82c137153e670402098003001700d1bd", 0x33fe0}], 0x1}, 0x0) 21:38:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000000000000f0000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(0x0, 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1684}]}, 0x1c}}, 0x0) 21:38:53 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1293.095349][T24671] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1293.120309][ T27] audit: type=1804 audit(1597095533.260:200): pid=24668 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1806/file1/bus" dev="loop3" ino=243 res=1 errno=0 21:38:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(0x0, 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000140000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) [ 1293.144720][T24676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1688}]}, 0x1c}}, 0x0) 21:38:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(0x0, 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) [ 1293.285296][T24688] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1293.295854][ T27] audit: type=1804 audit(1597095533.440:201): pid=24687 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1807/file1/bus" dev="loop3" ino=244 res=1 errno=0 21:38:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000340000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x169c}]}, 0x1c}}, 0x0) 21:38:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1293.346576][T24692] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000480000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1293.417636][T24704] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1293.460959][ T27] audit: type=1804 audit(1597095533.600:202): pid=24706 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1808/file1/bus" dev="loop3" ino=245 res=1 errno=0 [ 1293.534422][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1293.692396][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1294.044066][ T27] audit: type=1804 audit(1597095534.190:203): pid=24691 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir202963355/syzkaller.gKXzLf/1727/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 21:38:54 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x16c0}]}, 0x1c}}, 0x0) 21:38:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000001520000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1294.071478][ T27] audit: type=1804 audit(1597095534.190:204): pid=24691 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir202963355/syzkaller.gKXzLf/1727/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 [ 1294.102288][ T9109] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1294.113600][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1294.172579][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1294.181153][T18314] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x16dc}]}, 0x1c}}, 0x0) [ 1294.203818][ T27] audit: type=1804 audit(1597095534.310:205): pid=24729 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1809/file1/bus" dev="loop3" ino=246 res=1 errno=0 21:38:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000600000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) [ 1294.349230][ T27] audit: type=1804 audit(1597095534.490:206): pid=24744 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1810/file1/bus" dev="loop3" ino=247 res=1 errno=0 21:38:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x16fc}]}, 0x1c}}, 0x0) 21:38:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r3, 0xc01064bd, &(0x7f00000002c0)={&(0x7f0000000200)="fb73899c5bc78c672a79f692c9bf482400bf09ae4e04a67052b9698bd4fac350ec9a3a43ab5cb7c249b0688493069a050e16b5497b43a4df449b5628e8ed77c541a472cb2dd7e4c944cd0cf7377b25a2204dd59ee7b944f0c19201ab3350033ae014c7f27180bac8148be2c2e21ee6b9a3f6e58279ff2240f1c5abfeb112eaa1eb491a71a14fba312ce1af1b559c29224070414a2f", 0x95, 0x2}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000400)={r4, 0xf1, &(0x7f0000000300)=""/241}) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x84}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfff}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x5, 0x10000]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x6]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x200448c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r6, 0x80045503, &(0x7f0000000000)={0xf}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 1294.732354][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:55 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000680000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1718}]}, 0x1c}}, 0x0) 21:38:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000040)={0xb9, [0x10001, 0x3, 0xfffffff7], [{0x0, 0xffffffcf, 0x1, 0x1, 0x1}, {0x10001, 0x8, 0x0, 0x0, 0x1}, {0x8bd, 0x694, 0x0, 0x1}, {0x3, 0xf89, 0x1, 0x1, 0x1}, {0xffffddee, 0x7, 0x1, 0x0, 0x0, 0x1}, {0xfff, 0x144f7940, 0x0, 0x1, 0x1}, {0x9, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x7fff, 0x1, 0x0, 0x0, 0x1}, {0x9, 0xf8, 0x1, 0x1, 0x1}, {0x8, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x0, 0x3, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x7, 0x1, 0x1, 0x1}], 0x8}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 21:38:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000800000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1295.046862][ T27] audit: type=1804 audit(1597095535.190:207): pid=24781 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1811/file1/bus" dev="loop3" ino=248 res=1 errno=0 21:38:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x173c}]}, 0x1c}}, 0x0) 21:38:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000ffffff9e0000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e22, @multicast2}], 0x10) 21:38:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1760}]}, 0x1c}}, 0x0) [ 1295.452763][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1295.772378][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000ffffffef0000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:56 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:56 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x178c}]}, 0x1c}}, 0x0) 21:38:56 executing program 1: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000000206010000000000000000000000001010000300686173683a69702c6d6163000900020073797a31000000001400078008000640000000000800134000000000050001000700000005000400000000000500050002"], 0xff36}}, 0x0) [ 1295.898421][ T27] audit: type=1804 audit(1597095536.040:208): pid=24823 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1812/file1/bus" dev="loop3" ino=249 res=1 errno=0 21:38:56 executing program 1: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0x0, 0x2}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r3, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x6, 0x81, 0x81, 0x200, 0x1, 0x2, 0x4, {r3, @in={{0x2, 0x4e21, @private=0xa010102}}, 0x0, 0x80000000, 0x0, 0x33e7, 0x5}}, &(0x7f00000000c0)=0xb0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={r5}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 21:38:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x17b4}]}, 0x1c}}, 0x0) 21:38:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000fffffff00000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:56 executing program 1: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0x0, 0x2}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r3, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x6, 0x81, 0x81, 0x200, 0x1, 0x2, 0x4, {r3, @in={{0x2, 0x4e21, @private=0xa010102}}, 0x0, 0x80000000, 0x0, 0x33e7, 0x5}}, &(0x7f00000000c0)=0xb0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={r5}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 21:38:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000007fffffff0000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:57 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x17d4}]}, 0x1c}}, 0x0) 21:38:57 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) 21:38:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000ffffffff0000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:57 executing program 1: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0x0, 0x2}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r3, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x6, 0x81, 0x81, 0x200, 0x1, 0x2, 0x4, {r3, @in={{0x2, 0x4e21, @private=0xa010102}}, 0x0, 0x80000000, 0x0, 0x33e7, 0x5}}, &(0x7f00000000c0)=0xb0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={r5}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 21:38:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x17f4}]}, 0x1c}}, 0x0) 21:38:57 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) 21:38:57 executing program 1: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0x0, 0x2}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r3, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x6, 0x81, 0x81, 0x200, 0x1, 0x2, 0x4, {r3, @in={{0x2, 0x4e21, @private=0xa010102}}, 0x0, 0x80000000, 0x0, 0x33e7, 0x5}}, &(0x7f00000000c0)=0xb0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={r5}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 21:38:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r1, r0, 0x0, 0x8080ffffff7e) 21:38:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000020000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1814}]}, 0x1c}}, 0x0) [ 1297.094853][T24896] __nla_validate_parse: 21 callbacks suppressed [ 1297.094861][T24896] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1297.176189][T24903] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:57 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x4008000, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:38:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080ffffff7e) 21:38:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000030000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1838}]}, 0x1c}}, 0x0) 21:38:57 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6900) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) 21:38:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000040000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1297.834632][T24916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1297.854314][T12097] net_ratelimit: 3 callbacks suppressed [ 1297.854320][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:38:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001040)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bfdbb4dde984510c82dc2b9381b72bf40c0682fd0a0c4ac106b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb398d0400b3df9858837458a4ca037604000000b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02cc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8b99bffffb1ac006c6751aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d9289ede7a487367d6d7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a7844f9dab530388eb1771313a3ba71f43d4abbfc59d6d1b18fe380df4bf024f120bd715d82033f2fb7d8fc9e0d77b294e097e293db7f002c0024ab2fd8e5e7fb178f047ba32548b4d32972cba6f49051cec1bf6f16231bbb90a2d201a5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde2480ae40d6156edc4cf81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f81074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba505000000968981811f832d064048c0e0bbe46984f1f0d0504255c22ee8674053d0e160e525536edf56a93d0a7a6f0889f4ee8964875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd0c84892c97c809d116b059a718351620b846e31ce0b8ef953de70ea8b74a0f3c3d1e70f8a42ca26ab295f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f798c7f520078fee48f83b5989543729e36a9e19686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85a41cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a35adbf0b9352be92986d63263b1aa5264cb4a82cf080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e9851e81d4a355a7d00d917c16a2bb0cfb284fcfde9015769545c2f55030000431be123b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb463c407f87dafd6199f9ddd1f62da58c00020000000000009aa38a05e70591d5cdab1c268ef3c1984c7c0a566cfc2ab6e6fbc99ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8ad62edc65828fbb6e279f745d2872f0208635e465ca443a6a64c7803760880af23fb3f438a5d11fffc96dd1cb951642f1433f65b4e170a62a5f7a8d0f9d5cef0d17289c43d4aee2127f7a343899434594cc23e1c864164e130754b337e520f285dc670a31241bfb43ac62fc7f985586168483427072a535f2cac81ec261c0000000000f725de74e48d9a86f7d4a5d28d56ce6d571661dccad7ca6d961f525f799b4517141fc98af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630ed5a0c2261bc2d5de6ee174534b8dfc0432ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f29c661d322ba21c65badf55d1859ea7eabc5717a781f83292a3337d4dddc97f31390bb87adc96c755278fe2addd4581f9e7ef3e2693b46a8fc85be061ce79aa2832c04dc04db8b6536123b24be2ef80eb06b2db900fb30596c1574bda31f81d61ccfd58080d2330bb91603e250eeedc7d6b9024dce629c9e2fcabe07147bb022806dbd8457bb29bc3aa769dd576896e49ba8aac5e1fb6e47e4ce04cddddf69377c25d09871e1323a2ea6ae3dc1c2762c4bb5e12a797664a9bcd577176fb8143e9c658437104a894d08c85907ccf0bd7903c9721e2babd148dff5e2d42de4b1be8918cbab317f6056e1df5da48afddc66ffd85644b70049344052b5f0d88b80f58944bd8186a9f95bf91d65ab9e9f0f925c0d3a4e1d6081d6ffef87c8caca7ddea56021a8d15985fcc8575872f4c2e556bfa31e6b4f851a9f1da16ef69b671371f46d1ad1e5562196f4d897caf39c9b8f8d9d8263e343f3e32acf35b014dac9270269c16d8fe4664f9a4ddef0da04330e8e3bed4e7f376983eb2216e77afea73f1dec37986827ed2999a9bc237b518da9b28538072f006b46506f3f7dda7f47128fac53a2f758443614f4080fffa44d153585a02e0cb453700cf7d6f61480f3cce4a69139e24e0000000000e404eba9f88f86ec15974482d9b7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) [ 1297.897865][T24926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080ffffff7e) 21:38:58 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1860}]}, 0x1c}}, 0x0) 21:38:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000050000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1298.067405][T24940] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1298.091520][T24946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1298.149620][ T27] audit: type=1804 audit(1597095538.290:209): pid=24944 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1816/bus" dev="sda1" ino=16374 res=1 errno=0 21:38:58 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:58 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000380)={0x1f, 0x0, @fixed={[], 0x10}, 0xfffe}, 0xe) 21:38:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000080000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080ffffff7e) 21:38:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1888}]}, 0x1c}}, 0x0) 21:38:58 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r0 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080ffffff7e) 21:38:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000090000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1298.724142][T24962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1298.751659][T24965] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x18a0}]}, 0x1c}}, 0x0) 21:38:58 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r0 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080ffffff7e) [ 1298.838759][T24973] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1298.866818][T24979] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:38:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000f0000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:59 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r0 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080ffffff7e) [ 1298.892507][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1299.042107][ T27] audit: type=1804 audit(1597095539.180:210): pid=24990 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1817/bus" dev="sda1" ino=16346 res=1 errno=0 21:38:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:38:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x18b8}]}, 0x1c}}, 0x0) 21:38:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000140000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x0) 21:38:59 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) 21:38:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000340000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x18d4}]}, 0x1c}}, 0x0) 21:38:59 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) 21:38:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x0) 21:38:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:38:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000480000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:38:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp\x00') r1 = open(&(0x7f0000001340)='./bus\x00', 0x141842, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x0) [ 1299.932396][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1299.933006][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1299.948866][T22578] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1299.952590][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1299.965429][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1299.995978][ T27] audit: type=1804 audit(1597095540.140:211): pid=25037 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1818/bus" dev="sda1" ino=16374 res=1 errno=0 [ 1300.172280][T22578] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:00 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x18f4}]}, 0x1c}}, 0x0) 21:39:00 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) 21:39:00 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x2, 0x0]}]}}}}}}, 0x0) 21:39:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000600000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1300.492758][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1910}]}, 0x1c}}, 0x0) 21:39:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r0, &(0x7f0000001140)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)="f518377a1d70479d6a10101fa397cb3b3a2cdfe6f8b8225f39f962d5c8a19e856ccc8cc29f475544", 0x28}, {&(0x7f0000000140)="391eb4b258bdb8585bcf29512c8762f01b4cfdf7409a4d498a95848499ce2e9a0579e3ce47ea89d237af3ac878f00c02bff58d73ec1e", 0x36}, {&(0x7f0000000200)="8f31ae97c81b31e59a6321f6d6e7f21d384859a4d4112372437d5b5f5a6292c8ceb3be4422d7cf23b03f61469ff5a6f8eb9308cef2a919995b8733512a01c3f576ee6534fa2c88745fdce338088985578924138f03c818f44d1c1e36098b7343da0c82af4f5005d47b085f39d9f160a8102a24126d2db71220942573ea545be2d41c9cc3ce50a75a518228d678792b4bb1bf379d8e1cffe3418f9460f0544cdf593ea8c85cd72639657464c55ebc993c9695a1d094384522c0713f88500c365c97c60426e6bfe37c48f801bfe479ab5014e3f68e", 0xd4}, {&(0x7f0000000300)="518415d3587e4ebc3fb49d766a817e3aa9cfdb30b40664e6d59fe31e3bb8128228edb270e71455acabec61bfa64f48fdf184e4d8d40d39eb82c0cc949e431e50224841a39d895b0d92ea7bb491334908c1dfb4f9b5da6859aba7b4d7fab3b6b953740f60010eaf80b05cf6297f45a10086fb3f23769abccc0eddf1fc129a57bca42226e6e605ccf471e8b66515138ca6926c44faffe45c7a26dc90cb9ce026b79331d4dfd0c26ab472f4e737cd46edf98d124a79902b05478aca38dd67bacab7e886c7865c41e859a60ca5bfa7e54de75e9ed8c16debd73f1d124a755dedcd5df0e2756a2050af9fe0b9029039c0e9", 0xef}, {&(0x7f00000004c0)="cb491d5ffb1d697180f17cf5ed31bb34d3aa3fab3d6aae9b3d6ef835fb11beac2badb96df27bb4989e44fa998285956add0426cd3ede0346e681884cc83126bfb8edaa14f43ca4630fc1f8a0b11dc693236a45a19afb8bca1510c6ab79576fd7fa9a6156e1b7ddbb3ba73bf3246555bed7f59303", 0x74}, {&(0x7f0000000640)="302b4da6284ebb323743564a8ae0e730ea256f1a8c4861f5146e2c4298b8905b3f8b89c42dcc3d5708441dbccdf8e92db9425a392737fee910c8a35561762548da9ad5ed73b04967d2931b7fc668629f05fdb62a7660875514469ba392effabd79306cd793423e16c46a008fe6c640e3ca2034c36ffe41357abc0ecaf95e1b192a95f9c5adf2a1d8f842ae4412b157b00ade15fe6778fb53d8993e3371bbddf1860e44c0cc9c48823d5da923b9d7891b6ed2dbfd1535df524d418c9e0dbad1d4f24166a0d1c0bbeb0acea362e2667a7499e7b715c192ebf297ff403eb74a50d36a6835a8b8842d66be94e24ebe4d", 0xee}, {&(0x7f0000000540)="c1a4e7f09acbdc84aa5319b012216b7b32a6", 0x12}], 0x7}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000840)="55a63ca73d52b3f955f5250cf8e6f342d3ed59380ccace432b540b986ed7e7ce21271459842f0afec93a59a4ab6660874735b2432bb7fe14014ee6d1ab994cb87b6ecfb4d3d4c424cfbfd9a1d1fbdc98aabb8d4e23cbba6a5b1bbf2cc2f28ea2bb64ee1301dec8a325a1c55291636fabbc94c3585de3fd5371aa09b1e3df61092ad3cf89b85f", 0x86}, {&(0x7f0000000900)="b1f0d096818125e3be2eb1e552a0bbbd76e4e9712eb1556a0458812c31e058d7fed68074a1d37ea07ea46f73b15ec6a21cabb57e529f403b89639ce9b3fb661ca7a297749f71f21af2da14b25fb201ddb80e269fd2185a2d3f1dd6ebc04be0861c1bc0f9e923c33134d6d9419d512e04c1ecfb1ac4a29383fd2a0d83e0e641c75b4d9da1c1968b51df426ace85d5260a14a486f8e499aa96b37687f8b1cbd473be8c0dcb47df1aed0602edaaf46a4a2321f0576cc3e2ba1219e7a5f690d68ca017f96a30436167c066da00eae4db2d404e7adf0bf96646a2ad68fbb7803b73be3e1afadb", 0xe4}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000a80)="1179c8bfd4cd9f76dca3196a84497a8312f243acd5897f232f8a3efad897b17bde88980c4582e35ec3d7e64973f3886b3e40b302f09fe9935985d60fb36e1521d688da815a0574373bc15bae7908008d9ea5ebbb9f8d72950553dd63f7bf3ef85e1c34e8e90c69cffb3f50c1884ab7ab8a8daebf53e627e2f63dd9f42887d0c729880daf554294e3ac402a1cc070", 0x8e}, {&(0x7f0000000b40)="95ddd95bc0bdf4262b0325efb9f852597b3afc76cf3231a0650e8499f69c10485cc21b2ea259901640a913355c836553392b175aab6046a0f0cd6196c4a9cc4be6209864e9750e6e2cb9e17a620f94d026241a69073c34610c9869b7647096436b6ae94df7c8e3c13b65d717a561ca594d32cbb7043d0db07f4168af2fc2b9f162905e0b80ddad15071ce4d6b7d47fa63da4326206250a0cbd070c545a5a72fe3e0e9cbe30926a253d48bf97ce09997597b0b48c0cad3da34be635e449189eae81db17c066db6480e035a8a1bfd9e8c9602553b5e85292ab3b588ba2b3338d7a9f20958dd65532acd8619d99418892cda88fecfd6cd27c4d", 0xf8}, {&(0x7f0000000c40)="ed6e1b5624fe2878010530698b9a9d906f782793d8635f4de571ecbf51ea562222f322f36fce83f198cfaf1068053f8dfdeeb29e89b99c78cbcbbce13acde18f42e3f8fe44a290b417fa6c5df5e4be9e1384c5d23cd2b98c10608c09583546a2a8e9e5aa2441de574680bacc2942f3d3ff81691cf5518f84bd5cbf37d1", 0x7d}, {&(0x7f00000005c0)="9221d49122acc7d380aa", 0xa}, {&(0x7f0000000d40)="ff2c01230f6e68028ff1dfff80827d753d6c2ae64817986f06c538c41effdb5807f2122e4e4de161eb8010a3b66cfd019eab4fb8c7c8d8b49a3c2b3779f05ef3adb31e13c20a1613ab22875252e5f6abde189d20017f0f6dc8bd6719ab154dcd55b2355c5a355ca03b3e265e3d552679b15b3138c78dca9b92b279b86dbe2717ecd6787a71a9921a53043421d0c3ada3608c115a2032a4858abb33abdce34d3f2d155e01e7f262dc0f018d54ca654a1c4fc346c7e8ab247e8f5f847db8f7b9cbf754385780150df175d352f6e2b6e7fef7e7a37761142896a7c98ca8d44c31c20df2bf257d2171", 0xe7}], 0x5}}, {{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000f80)="ebb22d6bbaf00015ee66203039444353344a83b156600a614767e4bb23765c3170fbb4d90eaf793269d020afca", 0x2d}, {&(0x7f0000000fc0)="1569b33bb070f83600a121c7669187398da69d8b7f7d297f94ab0da950d524d6891a60", 0x23}, {&(0x7f0000001000)="6c15303889e4f926a45a09b48c8b1898a7c5d5e7bd19005671d0f934", 0x1c}, {&(0x7f0000004900)="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", 0x5b7}], 0x4}}], 0x4, 0x0) 21:39:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000680000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:00 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) 21:39:00 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x192c}]}, 0x1c}}, 0x0) 21:39:00 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1300.875776][ T27] audit: type=1804 audit(1597095541.020:212): pid=25079 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1819/bus" dev="sda1" ino=16380 res=1 errno=0 [ 1300.972305][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:01 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000520100000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 21:39:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1950}]}, 0x1c}}, 0x0) 21:39:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000300000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 21:39:01 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb86dd600300000020000000000000000000000000000000000000ff0200000000000000000000000000013a"], 0x0) 21:39:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x196c}]}, 0x1c}}, 0x0) 21:39:01 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) 21:39:01 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000500000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) close(r0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) [ 1301.723048][ T27] audit: type=1804 audit(1597095541.870:213): pid=25120 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1820/bus" dev="sda1" ino=16374 res=1 errno=0 21:39:02 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1990}]}, 0x1c}}, 0x0) 21:39:02 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) 21:39:02 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x1dd, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getrandom(&(0x7f00000020c0)=""/4099, 0x1003, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0x0) 21:39:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000900000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1302.262535][T25130] __nla_validate_parse: 14 callbacks suppressed [ 1302.262542][T25130] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000f00000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r1, r0) getrandom(&(0x7f0000001040)=""/4120, 0x1018, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) 21:39:02 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x40, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @mcast1, @loopback, [@fragment, @hopopts={0x0, 0x33}]}}}}}}}, 0x0) [ 1302.304228][T25138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x19b8}]}, 0x1c}}, 0x0) [ 1302.428607][T25152] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:02 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000001400000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:02 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) getrandom(&(0x7f0000001ac0)=""/4096, 0x1000, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) [ 1302.484183][T25155] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1302.592577][ T27] audit: type=1804 audit(1597095542.740:214): pid=25163 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1821/bus" dev="sda1" ino=16370 res=1 errno=0 [ 1303.053142][T12097] net_ratelimit: 1 callbacks suppressed [ 1303.053147][T12097] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:03 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment]}}}}}}}, 0x0) 21:39:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x19d4}]}, 0x1c}}, 0x0) 21:39:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x4000000) r1 = dup(r0) getrandom(&(0x7f0000000080)=""/4107, 0x100b, 0x0) ioctl$TIOCCONS(r1, 0x541d) 21:39:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000003400000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000004800000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1303.142671][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1303.175606][T25179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:03 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment]}}}}}}}, 0x0) 21:39:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x4000000) r1 = dup(r0) getrandom(&(0x7f0000000080)=""/4107, 0x100b, 0x0) ioctl$TIOCCONS(r1, 0x541d) [ 1303.215539][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1303.234900][T25183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x19f8}]}, 0x1c}}, 0x0) 21:39:03 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:03 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@fragment]}}}}}}}, 0x0) 21:39:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000015200000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1303.349046][T25195] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1303.374479][T25197] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1303.449368][ T27] audit: type=1804 audit(1597095543.590:215): pid=25205 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1822/file1/bus" dev="sda1" ino=16370 res=1 errno=0 21:39:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) socket$caif_stream(0x25, 0x1, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:04 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0x7, 0x7}, 0x10) 21:39:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1a0c}]}, 0x1c}}, 0x0) 21:39:04 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@hopopts]}}}}}}}, 0x0) 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000006000000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1304.092501][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:04 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@hopopts]}}}}}}}, 0x0) [ 1304.163332][T25218] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000006800000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:04 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1820}}], 0x1c}, 0x0) 21:39:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1a30}]}, 0x1c}}, 0x0) [ 1304.207284][T25230] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:04 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:04 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "52e00f", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @mcast1, @loopback, [@hopopts]}}}}}}}, 0x0) 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000004003000000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1304.417361][ T27] audit: type=1804 audit(1597095544.560:216): pid=25257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1823/file1/bus" dev="sda1" ino=16364 res=1 errno=0 21:39:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1a58}]}, 0x1c}}, 0x0) 21:39:05 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) 21:39:05 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0x0, 0x7}, 0x10) 21:39:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000340000000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000010000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000001c0), 0x94) 21:39:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1a88}]}, 0x1c}}, 0x0) 21:39:05 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb86dd600300000020000000000000000000000000000000000000ff02"], 0x0) [ 1305.060548][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1305.132370][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:05 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000000)='4', 0x20000001) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000280)={0x0, 0xfffffebd, &(0x7f00000003c0)="254e6e6457b94a706f24b50b613bff3ebc5d669fcccfa7539dec9b67573fe9fe31fd712d55ac76b885d2ef5c535d1622962d706343eaf12d7abd5807823ec7ca6f45b0ed0c82289e1dc00fa40b0c6cfba5d882d2e07d943e4761e7cfcb900a43038cdee3afb200c911d20bcdab3ce19a11ac8e9d0abcef82b399e1fa04fa7f9b3dd714cbb6bb14b6172ddd199fc8e689936916cf4f0a289c4b997807b9ed9a85b6a0fd95180f1d2951b0ef77637fb1652eae221d0dfbb740e15aed38a5a018ec0c8b15614a9f2b3fca32064b0c"}) r2 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x41) write$hidraw(r2, &(0x7f00000010c0)="3938961ceb6fc236a5322845a469d4c3877d57a11fd65412a4c1bf168efdabd04683a97d2b4daa5500ef816659539bbb755a425c67ed5701d97cf85baa88c56577400f0bf03a083be845e229927dd934f1b3642a3abbc9ca4cd0a7908c8764fd68b045024ee03996fef6e1e2f0258f1da9534fef6ded5204bdd8136bf22055c987ec80ee543a6d599dcbccf9ac9cc0dc1e980bcb5d2bc1afeb877bde1a98671f17cf244d1f588122846ea7899483b415ab3ce590798456a3df9cbc74b0b092f5b878474d32b92263b80bcfe0a06d84e641318f441cad572cbf63d68a3409056ec820ede1d4ff21062424919d347a258488074980dc5039f6a49ed25723922b9dc5fa446f155ff96c9b6a41dd17a4d0341c6920f3e758a26669d2598e33f7ce863f983cb256da175657d70f0ed564ad0ade022dad870392387e24e17e6bed0d9d14c5a5b9323b7e08e0294b158dd6e6fed7faddc6763fd098bbd20a782ac579646d1b74230445ab801b5987df1082de0642b0619d18004d519919cfb6e0f2f5e8fc0a3d600321986b4c3bebae787de4393f7b1a5c9f3b28614b4add4b2c70e3c112081b215a3296badf0b28965bedcbfff483f54f2d691697d7a67b06ff7461302a9219261201cbaece4a5444a7a5b45949d8df668975e4d0ced179bc874658c2c365206267a3daeb03138947d54691f96746d058452a148c132b2dd72a2c4a509b745583d3078ef7dcfce725bd747f03109ca5c38256eb00cb98b37f6dccaf636fe4277fa8bf82b3a0d72843506135cd63e23daf4e062d858ed57080af2cbaecf55daa065eee0e59e2f625b52fad04e392087191fa41352f48194580f098af1f366e16c936387675cbe418afe1fe8900e2c4bd93fa59585042db7016ddbc522589eb2d8cebc2554d401a80280a7cad6b433e67a44d5b2372e7449696363ee35c7a4e860b96a77610a72d746fc805a4d474763356dc24fde38a879cb51ec0eb33af3a86442f6700158eb9896c2c8f920a837981861464058987e2b54664fc6f3b45cac633a1f6ce819c9aca26594823765ace307e8e2853c6727ff1a4df3c65a9c88b94f0b0c74d98fabbb4c25bde41f58d8104cf072aaa6d94987097d64f6a377c58e9d77da4b9a40c9b7853edf2b3f195ff29442cffec411776625c4c55d0fded50c411ae6f0c52a92072a5fbd4b042f43ede865697e4b2f7b44e48485b4ac9ded67886f1f4aed0998af75c24c0cdcc895762fe21d99fdf4824734ba6b084c9991e76136d12afb02851e9457b8ac73128b799b5907dfad4722198eb15171ac230e9f799e0cb64049b335a246c1c3dbb575715fc4b674032e3b2a59e35426911efe89a389b88a5183c1167ad37fdc62de410d79e447cb89a2f5d6f695f21788e15c0d985a8adcf52c472902ec34936aeb76026666fc95819cc79e6f7973c09367f76f08bb124e233d19b164d92ab3b592dbedbc159c75e253f76c2b436bc0f6c88a6a817d0d3d979b8e8dc183d8aa8b30f5bbe734d617588758557009a45b57656b66190e707ebef55a1be37a2de4e3843bea8093cc2fc207dd7f89dd145254cb649c2b28ee58fc0afdfd90bbdc75e5a668499fbdcddf579694c096429d4243cb0b0d70abea48d3fb77067c3addb7de7abd6cdc51a9b973e8598d299723577bc8fd3bdf7a39ed7dcca97d7c8981afbaccba27bf2da15faac1de0b34abc1b3b73296e204c35c1dc0b16fb61879cbe424bd6ad7c9491f4d8e7f3ad27446989225019119dc26099caf9b4af867ae50d8cbbcd7c6527e1cc1fb7965b08c76ca7a6b0fd3e6bbd0de6d9004740e9aefc3b117dacb2cccdb0ae076cba6e50340e7ddfeb93b3020a285adcecdec8e2ee44c9c792e50a2dbd7bd55d605b6d2e4014acc5ee7dd68f5f691ce2112340acb148bebb0f458735efb83bce5d6f47469e74088716c3d7ae59d1895bf7db329a537c133bb2cdbb18c9dd385323592076af5a27fedbb24f5b169f96810114e2a0f657ddc5b93bd9f5040aaae6a5b619ccb4187ed86b3770e87b3426ed415ef83dcd6e23786bfb6d5a148e8751cf9018e01f23e3e4d98244286ce688e69436153dd80b89e8c5cb8c6c4226d4a1242f894708382087dc6a4dc1eaa741a40139ddf3a2ce30ba4b07b2c62d405b6d3c1b4d9b9b92ffcfbda4c51546f345d0baebf17f74e3a962fd07133bb6244d18bcb2edde1ef1654d016646eb685555c7447e211b8731d4aac3fc6b524687e1f40b4a4d31420fbc58dc53bf8fd66a4b2822d2ec9cf28a4a5a7d4ea43cfe29c236af8b093743ee52f43b863612e6139a6e9ff88594d849b062b4d49e9908202fae9a6d9ee7d1108b7fc35976d2e99db6b20b0c3538b33903db0e3671c2a977151ff6876ce23b3b0c531b709d6adc0cf59a3b4774516f9266b61b29e079243e31466b1957960f13936f2fb5bd20e8f91e4800ae6a239de7813d4a5d1c3f0549dc0250e1407a66ac30c69875a2962ae6b3145994974cf4e3b60833b23712db853e7f2a990c7665d845ec4a1ec5aa69cc173738d4f21534b68dab9b5f1fb8f05ceef2ee9b9e3c3b901f1d8b6b285f707801592eb814757add33b123aee2db7c5c2e3cbaf2a56585115425c3d49a2eb3e052daa9bbd0c8174f9c772559b9e670a38903bf7ddbb3089930fa57bbba6149e402c27def74b8337fffd0a1ed5203c2951b07280e49b9a355289bf568d7a9c162fd1c8d62508c2b9ad81d65cd86334ebffa170e793b764c5ffff159e4c6d12cc55a274236331d2bf9f71c99a2a58c2217da5309828d12c5771a7d7af3d73a4aae9928229eb3aa12234e463debce87fd214d42a120241a7ec5e55df09ab933df9ccadd17328236d14372ea02726aa7a0d5cc59ca72614c6473bb213fa39ab347017380de23d7dae48850b1e8b878da39f11ee6c851b51238179a672edf878c9f7943822904d87747c578e5e918d86b8645192589b8ff1cad9b650f1b706fcd82bd01307698e54834b5cc9f2d769bc86e0e4e8ff6f6576c5a161f591ceb6effd9b67444eeb0fd5097b2fb2e026af6718697fdbf756ace93a999cc0136e8d8ba59185c60854a29d1ea7800eb9861ba1d31a2560966db94929ce7f2b470245c5d9d9ae71ceafb152e0097ba7d3ffd20c4faeffb09b24b6d770c7dee32a2cfb58ba0bd857a4c8e17655c75d9cf52198cdf5a7a5d3495c08584bb9da3119fb3bdb724b4d3584ed758d85481a0f493625d63abf4bbc0648314bd72dd978d5a9fdc47b3966f08a03fc4d1decb2ad74a201dbff17848de9935b9e7ed78f88067a5d860d4573a1e94337553f9ba55e4c44a1f8dd57b7b9364697e3f24778b115a8cae02513a5972ba2004f4ff64a399c253834a52c13d2cca820e4b217aa216bef220049486468763e80c8c22e7c2bab83ca35e5bc7a863df8dec39e1b7d087992bca67e987f02c7789e04871dd4af0af19c35517885517532bb0afe23e9dc3c032906efe837d00c536a3abe1385f180d290bcd00279da69ac5af1ec731921138f95f6aa9fdb179f92703a1f60c4d8f20f4d37820bcc5ae889548babb8411cf3729c24e415896ea97e64db11f93bb08de26e70c761fcbe2d1894ea5385472f9d859338928051cfdf798a13fb66af93130ff2cff5f8de9788a2d528948f949a4cb215a686d8ba06b7c4ddfcc0b3bbe366b352cd5812199dc3fb94df418df17457e7e7dfe299f5892c5e7a04f8396628d84c5334fd81e9324e51c6c6967bb85e33c5d06ca4cc6411b4fa15cf3d3722c8ace36cd59f6b36d0fd819fb45a3bc4ef09a40c842d89f4ad167b80434fe5a9cba9f729650ac03ad7ae476a68de4d6ed66611ee6461319b8cbaf3874e464aedeca3a5bfafe7c4c1273f61ca2fdc201927c037c29e483746b8b56971647d1c35f947c2f6ae501a6bd27e4c7bbad3ac30d8477f9af2c907d1d4af8b2663232bb70a931f247f4f19861fdc52b78ea9912482c2d3b8384a65d3cb5dde6b74f3cf2d1b2f7f81e2e78240fce49650fadbca49c9b00e58bccbce5083507a293aeff22c89cbd5701b5e3cbc0362b02d29b69ae4c5eea29ec50895579e7b39892a275b9d3aba7dbe128f3e560bd16d9a4132c1a24bc2d610de6e647263363a9ed4b359193d0035a1cf84395a4da500989496bccf2932fa697a2b030d102424e6cf5fff9a0133ab9cd9dbd5332af3ae5f728ac8a6bf7464e74e78a0575689ae96ba6f2876fafb9e46939075045824dbd83955f07c59cbd5b5f8f85c3d3765c02a8c4e584bc4ab8a6db85ac2cd74b1943d0f7ffa14bf9bf4696546cf2d334b1c4102c8a85b3bc9d3b4ec7b4e6947076a9614971d07f30dcc16045776e98273368d75a23f82a5555380984ac4403d67a8d047f80cf040aac5662c82c2a9d09f64d0606b90a34bd90d35eac89819390ca4f5c4f3310f2ffc580a5430d79b5571c79b3f12e24b72b84d136627055384b71023dcaf6e8b2ac05db650a2e0fe35756b7185b7d264b54bc59616d74cfbfb161b63336447f365ef25dc38a84e400212730d5948429025ec85c7c19c34a0c11bc904285d5173e1f92b8b8f73d16e6f796db347abf0e18f0bd7a9e4c061d2a5b840753d262776aac0cc0afb6ff486b9524a9b057088c9294d38ab45542f2d2ac8f58484c813474568a81e9b324f6fd3f031d78cf519c5beb6b56974257196cb7ab5752f40377eb15db848162e06db143a9ea8ec6f84f9aba8bd7bfdd918ae28f44d666995bb5742ed27f1d8df917d05a6e91d4d543e0648039173c646fe95281d0b2fa40cac78eabb64000ef29a6cc8c4331818f0aa3ba23f20d7596dc6f777a8395634c037650e4660856ddc0ac0a153128517abdc89aa9a42409de2f3ede2cbc6665d5ff1ac14c3a48251d527c05c753f56432580c1bf4b6f313a655441a2c23facb3f42d188ed87b5ad066f3d31c0a94e32b83ea8c3e6fa74e1abdc9dd3fdd03aee6195e3cb4552cb6184942d518d0572538864f5476e0729b9f24ba423bb9eaef31c24fb1fc23b6a2c658614f515fafc4d47452248af10571fa60756a53724fa462459bd94a239e03e2248cd8107a016fe447c7327a5fa45bd89b226efff012d80edcebdeb5715eb6645a165013f92ed9b4c1d17ff2dd5ad04c9b9d063e99e3e88d3778ed924c7d06ba857421d0346e1df85c57d832ce60508b4d5be174236a47af25f8ad497e45252ed057596aae35af086452ecca61d708c0221c38385a236a8d24ac1d2460007ec3609cc47d47ac36c1fe034d7522099f4af9fe60dd016b04498434a0ce0755c3620200a9b37a6d7ebf964fafc0cbebd171d5ba788a2c3e71829a1f154c8c2607f10bac0f529b4e9956b87e138879eb338d55354deb34338a897079b5439cccab33dd64cc54bec744277452759e81eb784f0af9325b1a63d81225f8441da67c84f5cbced4d3c125975063271ae511cd82d44407328060ef3e960bbe6203365a9fbbdd21dbb14a8b28589796051bee2ca41a93874119097da391c80916e89afbe", 0x20002001) ioctl$HIDIOCAPPLICATION(0xffffffffffffffff, 0x80004506, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000040)=""/142) r3 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r3, 0xc0045878, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000200)={0x0, 0x0, 0x0}) write$hidraw(0xffffffffffffffff, &(0x7f0000000140), 0x0) syz_open_dev$hidraw(&(0x7f0000000140)='/dev/hidraw#\x00', 0x9, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000380)={0x2c, 0x0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0], &(0x7f00000005c0)=ANY=[@ANYRES16=r3], 0x0, &(0x7f0000000340)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x40, 0x0, 0x1, 0x3f}}}, 0x0) 21:39:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000020000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1305.356557][ T27] audit: type=1804 audit(1597095545.500:217): pid=25311 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1824/file1/bus" dev="sda1" ino=16370 res=1 errno=0 [ 1305.692770][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1305.703133][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1305.711228][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00K'], &(0x7f0000000040)=0x8) 21:39:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1aa8}]}, 0x1c}}, 0x0) 21:39:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000030000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1ad8}]}, 0x1c}}, 0x0) 21:39:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000040000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:06 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:06 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) getsockname(r2, 0x0, &(0x7f0000000240)) 21:39:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1b00}]}, 0x1c}}, 0x0) 21:39:06 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:06 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000050000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="ab", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 21:39:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1b28}]}, 0x1c}}, 0x0) 21:39:06 executing program 1: socket$inet6(0x1c, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb86dd600300000020000000000000000000000000000000000000ff02"], 0x0) [ 1306.172399][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000080000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000100), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000005c0)="000000cb68dff0d6a90f2971180000009b67a587cfd5fa8d26eb84d7c1b2e0f56059bc29d86f985cb6fac3182b97bf3f9e5fb968b224bf3181164c9b84de5a15a8db31ffaa16f1c804a6328f415b45449cce60fbb36225ded7ce5834ea78f3cd4602174a8361cbad45ff312fa4dd55c40d5d9c538f2de93880509b1f0ee5264e5996849aa209f32f82913900000080268fecf19b4f1ba9cd25", 0x99}, {&(0x7f0000000140)="0a47f44dcf01c764706ef1965336af512e8e2cf9e62323c044975dce368679bb8cc09f7d8bd611d2c94cd13c5aa194bc4017db841e8b45827af97990b65f02ba4cebaea0474c034e6877f3444b80120801d38ea7beee16510122dacbde893ad92880c68f7ca8ee94aa9da26802f819dda3dca3153a5ed8227cce9a003fcba61834183d8bad512d65768b694d", 0x8c}], 0x2}, 0x101) 21:39:06 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:06 executing program 1: 21:39:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1b50}]}, 0x1c}}, 0x0) 21:39:06 executing program 0: [ 1306.396773][ T27] audit: type=1804 audit(1597095546.540:218): pid=25377 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1825/bus" dev="sda1" ino=16355 res=1 errno=0 21:39:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000090000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:07 executing program 1: 21:39:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1b7c}]}, 0x1c}}, 0x0) 21:39:07 executing program 0: 21:39:07 executing program 1: 21:39:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1ba0}]}, 0x1c}}, 0x0) 21:39:07 executing program 0: 21:39:07 executing program 1: 21:39:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000000000000f0000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1307.300148][ T27] audit: type=1804 audit(1597095547.440:219): pid=25403 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1826/bus" dev="sda1" ino=16370 res=1 errno=0 [ 1307.348192][T25418] __nla_validate_parse: 18 callbacks suppressed [ 1307.348199][T25418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1307.391483][T25421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:08 executing program 0: 21:39:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:08 executing program 1: 21:39:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000140000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1bc8}]}, 0x1c}}, 0x0) 21:39:08 executing program 1: [ 1308.031833][T25430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:08 executing program 0: 21:39:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000340000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1308.074482][T25437] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:08 executing program 1: 21:39:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1bf0}]}, 0x1c}}, 0x0) [ 1308.137107][ T27] audit: type=1804 audit(1597095548.280:220): pid=25439 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1827/bus" dev="sda1" ino=16355 res=1 errno=0 [ 1308.220026][T25452] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1308.252385][ T1340] net_ratelimit: 3 callbacks suppressed [ 1308.252391][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1308.264739][T25454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:39:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:09 executing program 0: 21:39:09 executing program 1: 21:39:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000480000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1c20}]}, 0x1c}}, 0x0) [ 1308.900057][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:09 executing program 1: 21:39:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000001520000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1308.947388][T25469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1308.974054][T25472] FAT-fs (loop3): bogus number of reserved sectors 21:39:09 executing program 0: 21:39:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1309.007017][T25474] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1309.023823][T25472] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1309.066268][ T27] audit: type=1804 audit(1597095549.210:221): pid=25484 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1828/file1/bus" dev="sda1" ino=16338 res=1 errno=0 [ 1309.292492][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1309.300600][ T9102] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1309.532353][T22578] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:09 executing program 0: 21:39:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1c48}]}, 0x1c}}, 0x0) 21:39:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000600000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:09 executing program 1: 21:39:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:09 executing program 1: 21:39:09 executing program 0: 21:39:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:10 executing program 0: [ 1309.822921][T25505] FAT-fs (loop3): bogus number of reserved sectors [ 1309.836453][T25504] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1309.846384][T25505] FAT-fs (loop3): Can't find a valid FAT filesystem 21:39:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000680000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:10 executing program 1: [ 1309.888909][T25510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1309.922600][ T27] audit: type=1804 audit(1597095550.070:222): pid=25505 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1829/file1/bus" dev="sda1" ino=16351 res=1 errno=0 [ 1310.172816][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1310.332319][ T1340] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:10 executing program 0: 21:39:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1c68}]}, 0x1c}}, 0x0) 21:39:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000ffffff9e0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:10 executing program 1: 21:39:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:10 executing program 0: 21:39:10 executing program 1: 21:39:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1c8c}]}, 0x1c}}, 0x0) 21:39:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000ffffffef0000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1310.706384][T25537] FAT-fs (loop3): bogus number of reserved sectors [ 1310.714384][T25537] FAT-fs (loop3): Can't find a valid FAT filesystem 21:39:10 executing program 1: [ 1310.761407][ T27] audit: type=1804 audit(1597095550.900:223): pid=25537 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1830/file1/bus" dev="sda1" ino=16345 res=1 errno=0 [ 1310.823191][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1311.372320][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:11 executing program 0: 21:39:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1ca4}]}, 0x1c}}, 0x0) 21:39:11 executing program 1: 21:39:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000fffffff00000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1311.452447][ T21] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:11 executing program 0: 21:39:11 executing program 1: 21:39:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000007fffffff0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:11 executing program 0: [ 1311.566686][T25574] FAT-fs (loop3): bogus number of reserved sectors 21:39:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1cbc}]}, 0x1c}}, 0x0) [ 1311.635502][T25574] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1311.651528][ T27] audit: type=1804 audit(1597095551.790:224): pid=25582 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1831/file1/bus" dev="sda1" ino=15760 res=1 errno=0 21:39:12 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:12 executing program 1: 21:39:12 executing program 0: 21:39:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1cd8}]}, 0x1c}}, 0x0) 21:39:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a000000009effffff0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:12 executing program 1: 21:39:12 executing program 0: [ 1312.406849][T25606] __nla_validate_parse: 8 callbacks suppressed [ 1312.406856][T25606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1312.430243][T25609] FAT-fs (loop3): bogus number of reserved sectors 21:39:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000efffffff0000000000000900020073797a300000000014"], 0x7c}}, 0x0) [ 1312.454149][T25609] FAT-fs (loop3): Can't find a valid FAT filesystem 21:39:12 executing program 1: 21:39:12 executing program 0: [ 1312.488946][T25614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1312.503658][ T27] audit: type=1804 audit(1597095552.650:225): pid=25609 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1832/file1/bus" dev="sda1" ino=16380 res=1 errno=0 21:39:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1cf4}]}, 0x1c}}, 0x0) 21:39:13 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:13 executing program 1: 21:39:13 executing program 0: 21:39:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000f0ffffff0000000000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000010000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:13 executing program 1: 21:39:13 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000003) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1313.269635][T25636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1313.282940][T25640] FAT-fs (loop3): bogus number of reserved sectors [ 1313.289636][T25640] FAT-fs (loop3): Can't find a valid FAT filesystem 21:39:13 executing program 0: 21:39:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000003400000000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:13 executing program 1: [ 1313.332420][T25646] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1313.354887][ T27] audit: type=1804 audit(1597095553.500:226): pid=25640 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1833/file1/bus" dev="sda1" ino=15796 res=1 errno=0 [ 1313.382617][ T7941] net_ratelimit: 2 callbacks suppressed [ 1313.382623][ T7941] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1313.452289][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:14 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1d1c}]}, 0x1c}}, 0x0) 21:39:14 executing program 0: 21:39:14 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000003) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:14 executing program 1: 21:39:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000000100000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000000200000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:14 executing program 1: 21:39:14 executing program 0: 21:39:14 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000003) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1314.133667][T25670] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1314.158189][T25673] FAT-fs (loop3): bogus number of reserved sectors 21:39:14 executing program 0: [ 1314.197824][T25675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1314.208809][T25673] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1314.248227][ T27] audit: type=1804 audit(1597095554.390:227): pid=25683 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1834/file1/bus" dev="sda1" ino=16193 res=1 errno=0 21:39:14 executing program 0: [ 1314.492412][ T9313] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1314.653627][ T1082] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 21:39:15 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0xffffffff) 21:39:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000000300000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:15 executing program 1: 21:39:15 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x1d3c}]}, 0x1c}}, 0x0) 21:39:15 executing program 0: 21:39:15 executing program 1: 21:39:15 executing program 0: 21:39:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a01080000000000000000000000000900010073797a3000000000140000000e0a018300000000000000000000000020000000120a00000000000000000000000400000900020073797a300000000014"], 0x7c}}, 0x0) 21:39:15 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x1f, 0x0, 0x6, 0x3}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000003) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x5, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a88a69ba66f1023e3972f22b432f988261af1ed8d6909788300cebe3ab3d302c"}}) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000002200)=""/134, 0x86}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000400)=""/88, 0x58}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x6, &(0x7f0000000600)=""/181, 0xb5}, 0x8000}, {{&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=""/247, 0xf7}, 0x6}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/148, 0x94}, 0x9}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002180)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/113, 0x71}, {&(0x7f0000000480)=""/120, 0x78}, {&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f0000000500)}, {&(0x7f00000020c0)=""/160, 0xa0}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/73, 0x49}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/51, 0x33}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/249, 0xf9}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/55, 0x37}, {&(0x7f0000001140)=""/167, 0xa7}, {&(0x7f0000001200)=""/43, 0x2b}], 0x9, &(0x7f0000001300)=""/176, 0xb0}}, {{&(0x7f00000013c0)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/110, 0x6e}, 0x9}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/116, 0x74}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/208, 0xd0}, {&(0x7f0000001a40)=""/151, 0x97}, {&(0x7f0000001b00)=""/16, 0x10}], 0x8, &(0x7f0000001bc0)=""/208, 0xd0}, 0x4}], 0x7, 0x10042, &(0x7f0000001ec0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 21:39:15 executing program 1: [ 1314.996494][T25704] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1315.025169][T25706] FAT-fs (loop3): bogus number of reserved sectors [ 1315.032082][T25706] FAT-fs (loop3): Can't find a valid FAT filesystem 21:39:15 executing program 0: [ 1315.093867][T25711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1315.101137][ T27] audit: type=1804 audit(1597095555.240:228): pid=25706 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir919852408/syzkaller.3VjKzz/1835/file1/bus" dev="sda1" ino=16022 res=1 errno=0 [ 1315.374207][T22578] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1315.462078][T25721] ================================================================== [ 1315.470191][T25721] BUG: KCSAN: data-race in ext4_file_write_iter / ext4_handle_inode_extension [ 1315.478999][T25721] [ 1315.481301][T25721] write to 0xffff88808f4012b8 of 8 bytes by task 25706 on cpu 0: [ 1315.488988][T25721] ext4_handle_inode_extension+0x214/0x530 [ 1315.494764][T25721] ext4_file_write_iter+0xdb3/0x1000 [ 1315.500207][T25721] do_iter_readv_writev+0x32e/0x3d0 [ 1315.505375][T25721] do_iter_write+0x112/0x4b0 [ 1315.509944][T25721] vfs_iter_write+0x4c/0x70 [ 1315.514420][T25721] iter_file_splice_write+0x41a/0x770 [ 1315.519761][T25721] direct_splice_actor+0x95/0x160 [ 1315.525188][T25721] splice_direct_to_actor+0x365/0x660 [ 1315.530529][T25721] do_splice_direct+0xf2/0x170 [ 1315.535278][T25721] do_sendfile+0x56a/0xba0 [ 1315.539663][T25721] __x64_sys_sendfile64+0xf2/0x130 [ 1315.544743][T25721] do_syscall_64+0x39/0x80 [ 1315.549128][T25721] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1315.554984][T25721] [ 1315.557291][T25721] read to 0xffff88808f4012b8 of 8 bytes by task 25721 on cpu 1: [ 1315.564890][T25721] ext4_file_write_iter+0x1a1/0x1000 [ 1315.570173][T25721] do_iter_readv_writev+0x32e/0x3d0 [ 1315.575339][T25721] do_iter_write+0x112/0x4b0 [ 1315.579902][T25721] vfs_iter_write+0x4c/0x70 [ 1315.584394][T25721] iter_file_splice_write+0x41a/0x770 [ 1315.589753][T25721] direct_splice_actor+0x95/0x160 [ 1315.594754][T25721] splice_direct_to_actor+0x365/0x660 [ 1315.600099][T25721] do_splice_direct+0xf2/0x170 [ 1315.604869][T25721] do_sendfile+0x56a/0xba0 [ 1315.609257][T25721] __x64_sys_sendfile64+0xf2/0x130 [ 1315.614337][T25721] do_syscall_64+0x39/0x80 [ 1315.618724][T25721] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1315.624579][T25721] [ 1315.626899][T25721] Reported by Kernel Concurrency Sanitizer on: [ 1315.633041][T25721] CPU: 1 PID: 25721 Comm: syz-executor.3 Not tainted 5.8.0-syzkaller #0 [ 1315.641357][T25721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.651390][T25721] ================================================================== [ 1315.659445][T25721] Kernel panic - not syncing: panic_on_warn set ... [ 1315.666004][T25721] CPU: 1 PID: 25721 Comm: syz-executor.3 Not tainted 5.8.0-syzkaller #0 [ 1315.674417][T25721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.684446][T25721] Call Trace: [ 1315.687720][T25721] dump_stack+0x10f/0x19d [ 1315.692027][T25721] panic+0x207/0x64a [ 1315.695934][T25721] ? vprintk_emit+0x44a/0x4f0 [ 1315.700584][T25721] kcsan_report+0x684/0x690 [ 1315.705170][T25721] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 1315.710724][T25721] ? ext4_file_write_iter+0x1a1/0x1000 [ 1315.716154][T25721] ? do_iter_readv_writev+0x32e/0x3d0 [ 1315.721500][T25721] ? do_iter_write+0x112/0x4b0 [ 1315.726240][T25721] ? vfs_iter_write+0x4c/0x70 [ 1315.730886][T25721] ? iter_file_splice_write+0x41a/0x770 [ 1315.736399][T25721] ? direct_splice_actor+0x95/0x160 [ 1315.741566][T25721] ? splice_direct_to_actor+0x365/0x660 [ 1315.747102][T25721] ? do_splice_direct+0xf2/0x170 [ 1315.752016][T25721] ? do_sendfile+0x56a/0xba0 [ 1315.756585][T25721] ? __x64_sys_sendfile64+0xf2/0x130 [ 1315.761847][T25721] ? do_syscall_64+0x39/0x80 [ 1315.766432][T25721] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1315.772521][T25721] kcsan_setup_watchpoint+0x41e/0x4a0 [ 1315.777901][T25721] ext4_file_write_iter+0x1a1/0x1000 [ 1315.783171][T25721] ? aa_file_perm+0x129/0xe00 [ 1315.787834][T25721] ? ktime_get_coarse_real_ts64+0x104/0x110 [ 1315.793712][T25721] ? current_time+0xe9/0x1a0 [ 1315.798272][T25721] do_iter_readv_writev+0x32e/0x3d0 [ 1315.803457][T25721] do_iter_write+0x112/0x4b0 [ 1315.808029][T25721] ? kmalloc_array+0x2d/0x40 [ 1315.812603][T25721] ? splice_from_pipe_next+0x217/0x260 [ 1315.818038][T25721] vfs_iter_write+0x4c/0x70 [ 1315.822570][T25721] iter_file_splice_write+0x41a/0x770 [ 1315.827926][T25721] ? splice_from_pipe+0xc0/0xc0 [ 1315.832745][T25721] direct_splice_actor+0x95/0x160 [ 1315.837739][T25721] splice_direct_to_actor+0x365/0x660 [ 1315.843105][T25721] ? do_splice_direct+0x170/0x170 [ 1315.848113][T25721] do_splice_direct+0xf2/0x170 [ 1315.852844][T25721] ? check_preemption_disabled+0xf0/0x140 [ 1315.858531][T25721] do_sendfile+0x56a/0xba0 [ 1315.862918][T25721] __x64_sys_sendfile64+0xf2/0x130 [ 1315.867996][T25721] do_syscall_64+0x39/0x80 [ 1315.872397][T25721] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1315.878256][T25721] RIP: 0033:0x45ce69 [ 1315.882121][T25721] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1315.901693][T25721] RSP: 002b:00007f6143250c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1315.910072][T25721] RAX: ffffffffffffffda RBX: 0000000000026bc0 RCX: 000000000045ce69 [ 1315.918013][T25721] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 1315.925977][T25721] RBP: 000000000118c008 R08: 0000000000000000 R09: 0000000000000000 [ 1315.934091][T25721] R10: 00000000ffffffff R11: 0000000000000246 R12: 000000000118bfcc [ 1315.942031][T25721] R13: 00007ffde45e120f R14: 00007f61432519c0 R15: 000000000118bfcc [ 1315.951015][T25721] Kernel Offset: disabled [ 1315.955511][T25721] Rebooting in 86400 seconds..