0202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 14:36:16 executing program 2: r0 = syz_io_uring_setup(0x887, &(0x7f0000000040), &(0x7f0000ee4000/0x3000)=nil, &(0x7f0000ee5000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x450f, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 14:36:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee01, 0x0, 0xee00) r1 = getuid() setresuid(0xee01, r1, 0xee00) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x0, 0x0}) 14:36:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="b832e36759ae90c5186ef98d296f2ea57247ad764fef8f25f83c5943bc169e7f010de208881ddf8297346622c4cc2da815b45fc3f69f32293ff97e9fbb077219088b4aea84bf8ce28a3353ad26c824014515bcee4c16b96b7dab4273516071cc0da26c0e9f29125618316ef03904bffa4097320390baaaff6ca61f6c128f79b62e879156fa4d8c666cf496ff30f762e31f", 0x91, 0x0, 0x0, 0x0) [ 200.170984][ T8418] loop4: detected capacity change from 0 to 224 14:36:17 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x20200, 0x0) 14:36:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) utimensat(r0, &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140), 0x0) 14:36:17 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) 14:36:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00') rmdir(&(0x7f0000000080)='./file0\x00') 14:36:17 executing program 5: poll(&(0x7f00000000c0)=[{}], 0x761b, 0x0) 14:36:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0/../file0\x00', r1, &(0x7f0000000140)='./file0/../file0\x00') 14:36:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) 14:36:17 executing program 3: select(0xffffffffffffffae, &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000280)) 14:36:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 14:36:17 executing program 5: setrlimit(0x7, &(0x7f0000000140)={0x0, 0xfffffffffffffc01}) 14:36:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00') readlink(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 14:36:17 executing program 1: clock_gettime(0x5, &(0x7f0000000340)) [ 200.386979][ T8437] loop4: detected capacity change from 0 to 224 14:36:17 executing program 2: pipe2(&(0x7f0000000000), 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000000}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$lock(r1, 0x9, &(0x7f00000000c0)={0x0, 0x0, 0x10000000000, 0x100000001}) 14:36:17 executing program 3: r0 = socket(0x1, 0x5, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x1}, 0x8) 14:36:17 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000ac0)={0x18, 0x3}, 0xc) 14:36:17 executing program 1: r0 = socket(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000007c0)=@abs={0x0, 0x0, 0x1}, 0x8) 14:36:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:17 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000840)) 14:36:17 executing program 0: mknod(0x0, 0x8, 0xffffffff) open$dir(&(0x7f0000000740)='./file0\x00', 0x0, 0x1) syz_usb_connect$hid(0x2, 0x3f, &(0x7f00000007c0)={{0x12, 0x1, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x1, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x28, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x8}, {{{0x9, 0x5, 0x81, 0x3, 0x200}}, [{{0x9, 0x5, 0x2, 0x3, 0x200, 0x0, 0x0, 0x7}}]}}}]}}]}}, 0x0) 14:36:17 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f00000008c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 14:36:17 executing program 1: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x200) 14:36:17 executing program 3: r0 = socket(0x1, 0x5, 0x0) sendto$unix(r0, 0x0, 0x0, 0xf, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x1}, 0x8) 14:36:17 executing program 5: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000800)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x0, 0x0, 0x0, 0x4}}, [{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x3f, 0x20, 0x1}}]}}}]}}]}}, &(0x7f00000009c0)={0xa, &(0x7f0000000840)={0xa, 0x6, 0x300, 0x0, 0x3, 0x0, 0x40}, 0x2a, &(0x7f0000000880)={0x5, 0xf, 0x2a, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x0, "6451f5377d03d189e86c18787967170c"}, @ss_cap={0xa}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x0, 0x1, 0x6}]}, 0x2, [{0x0, 0x0}, {0x0, 0x0}]}) 14:36:17 executing program 1: getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000100), 0x0) [ 200.645994][ T8466] loop4: detected capacity change from 0 to 224 14:36:17 executing program 1: fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000100)) 14:36:17 executing program 1: openat(0xffffffffffffffff, &(0x7f0000001a80)='./file0\x00', 0x0, 0x0) 14:36:17 executing program 3: pipe2(0x0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000a80)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 14:36:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:17 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0xc, 0xffffffffffffffff) 14:36:17 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffff}, &(0x7f0000000180)) [ 200.824770][ T8483] loop4: detected capacity change from 0 to 224 [ 200.898469][ T3712] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 200.918225][ T3707] usb 1-1: new full-speed USB device number 7 using dummy_hcd [ 200.938305][ T140] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 201.048163][ T22] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 201.088228][ T3712] usb 3-1: device descriptor read/64, error 18 [ 201.138413][ T3707] usb 1-1: device descriptor read/64, error 18 [ 201.139003][ T140] usb 6-1: device descriptor read/64, error 18 [ 201.238209][ T22] usb 4-1: device descriptor read/64, error 18 [ 201.368305][ T3712] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 201.418434][ T140] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 201.428242][ T3707] usb 1-1: new full-speed USB device number 8 using dummy_hcd [ 201.508319][ T22] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 201.568425][ T3712] usb 3-1: device descriptor read/64, error 18 [ 201.608267][ T140] usb 6-1: device descriptor read/64, error 18 [ 201.648307][ T3707] usb 1-1: device descriptor read/64, error 18 [ 201.688374][ T3712] usb usb3-port1: attempt power cycle [ 201.702402][ T22] usb 4-1: device descriptor read/64, error 18 [ 201.728318][ T140] usb usb6-port1: attempt power cycle [ 201.778261][ T3707] usb usb1-port1: attempt power cycle [ 201.828339][ T22] usb usb4-port1: attempt power cycle [ 202.118360][ T3712] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 202.138311][ T140] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 202.188213][ T3707] usb 1-1: new full-speed USB device number 9 using dummy_hcd [ 202.228385][ T140] usb 6-1: Invalid ep0 maxpacket: 0 [ 202.238239][ T22] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 202.248373][ T3712] usb 3-1: Invalid ep0 maxpacket: 0 [ 202.290950][ T3707] usb 1-1: Invalid ep0 maxpacket: 0 [ 202.328311][ T22] usb 4-1: Invalid ep0 maxpacket: 0 [ 202.378183][ T140] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 202.410430][ T3712] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 202.448206][ T3707] usb 1-1: new full-speed USB device number 10 using dummy_hcd [ 202.468298][ T140] usb 6-1: Invalid ep0 maxpacket: 0 [ 202.473729][ T140] usb usb6-port1: unable to enumerate USB device [ 202.480188][ T22] usb 4-1: new high-speed USB device number 11 using dummy_hcd [ 202.528463][ T3712] usb 3-1: Invalid ep0 maxpacket: 0 [ 202.533950][ T3712] usb usb3-port1: unable to enumerate USB device [ 202.558262][ T3707] usb 1-1: Invalid ep0 maxpacket: 0 [ 202.563792][ T3707] usb usb1-port1: unable to enumerate USB device [ 202.568403][ T22] usb 4-1: Invalid ep0 maxpacket: 0 [ 202.576159][ T22] usb usb4-port1: unable to enumerate USB device 14:36:20 executing program 0: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000003800)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x251, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x92, 0x40, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0x5, 0x7, 0x1, {0x22, 0xe93}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x7f, 0x20, 0x7f}}}}}]}}]}}, &(0x7f0000003c40)={0x0, 0x0, 0xf, &(0x7f0000003880)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x1, 0xfb}]}, 0xa, [{0x4, &(0x7f00000038c0)=@lang_id={0x4, 0x3, 0x407}}, {0x0, 0x0}, {0x83, &(0x7f00000039c0)=@string={0x83, 0x3, "a241b9b9d7b0daeffafec968cb98880e396c0a718626d720f60805db856c9470fe99ddcba19402a8db289f974070ab9c82d86f7df6d6a0fc4bb9b2f430f49c701fe09c4510c290bcfb706ec24ea46400c00846a8c0fe5c96f61127b38af2279fb603cf95b40267f1be044a0ae01126c3644e975c05a7b2a2ba53ee9e0fa8237700"}}, {0x4, &(0x7f0000003a80)=@lang_id={0x4, 0x3, 0x812}}, {0x1e, &(0x7f0000003ac0)=@string={0x1e, 0x3, "8eaebea42dbdda837d642ca7b804b992bad4aca1830bbb3f1b04ca80"}}, {0x40, &(0x7f0000003b00)=@string={0x40, 0x3, "738ed8d079925bd2ef7b57f0f895ad4d3c5bf79ff876d015e43eaa6530154815555e943f27fa4037364a6385c9be1cb4557245ea7b8e03584434d5f37342"}}, {0x4, &(0x7f0000003b40)=@lang_id={0x4, 0x3, 0x2c01}}, {0x4, &(0x7f0000003b80)=@lang_id={0x4, 0x3, 0x40e}}, {0x4, &(0x7f0000003bc0)=@lang_id={0x4, 0x3, 0x44a}}, {0x14, &(0x7f0000003c00)=@string={0x14, 0x3, "609ea0fcd724bb90f5a175bfecf3c389864c"}}]}) 14:36:20 executing program 4: mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:20 executing program 1: fcntl$lock(0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:36:20 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x80300) syz_usb_connect$cdc_ecm(0x0, 0x55, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x1b, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x40, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "ec4b38"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0xff, 0x50}, [@obex={0x5}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x5, 0x0, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x1f}}}}}]}}]}}, &(0x7f0000000700)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x0, 0x0, 0xd4}, 0x0, 0x0, 0x8, [{0x2, &(0x7f0000000300)=@string={0x2}}, {0x75, 0x0}, {0x0, 0x0}, {0xb0, &(0x7f00000004c0)=@string={0xb0, 0x3, "04bfac27f4ed539371f9494366a9542d3a558d370481b1cba4c3a4446aad9e6124aa0c51e61f0c887460342d15b325e7c83ead3f3632ce02de5939b72814a35531f42ba191ca53012ca29154a3df80063f327fb640cf29757827a420b5d11251f91569bf899c741261a30b81d0d6d0bc79ac83918bce7241bb72acf6b4e5c43cf25bcc5bb6d48d9c7a1fbc26469b64c7f3b9fbb8e861b19f18342b265de4f3836c35445726856e912eb3891764f3"}}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x4, &(0x7f00000006c0)=@lang_id={0x4}}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000001880)) 14:36:20 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000003800)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x251, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x40, 0x20, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0x5, 0x7, 0x1, {0x22, 0xe93}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x7f, 0x0, 0x7f}}}}}]}}]}}, &(0x7f0000003c40)={0xa, &(0x7f0000003840)={0xa, 0x6, 0x200, 0x3f, 0x0, 0x71, 0x87}, 0xf, &(0x7f0000003880)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x1}]}, 0x9, [{0x4, &(0x7f00000038c0)=@lang_id={0x4, 0x3, 0x407}}, {0xa9, &(0x7f0000003900)=@string={0xa9, 0x3, "c91685236fcddb427d1b4b762298b529808c35291b4f8613f8ffed58d86ec1ae7688b118deeae185f051615c0f3e63bf3b49133d3fee7c38f9b40a015ee641c9d345548d8a4f2a1faca8ee96443221a778bd89188f68b1a31ad492921396191d01e9d9db14ec46a49768a67e860a5b9c9a70482779a1e7e499f4a65794bb874c2450d118ed2d63278f4785ee576e840f38aea507ebc58bdfeed3d2c91ddd7828803964ecb0d066"}}, {0x4, &(0x7f0000003a80)=@lang_id={0x4}}, {0x1e, &(0x7f0000003ac0)=@string={0x1e, 0x3, "8eaebea42dbdda837d642ca7b804b992bad4aca1830bbb3f1b04ca80"}}, {0x2, &(0x7f0000003b00)=@string={0x2}}, {0x4, &(0x7f0000003b40)=@lang_id={0x4, 0x3, 0x2c01}}, {0x4, &(0x7f0000003b80)=@lang_id={0x4}}, {0x4, &(0x7f0000003bc0)=@lang_id={0x4, 0x3, 0x44a}}, {0x14, &(0x7f0000003c00)=@string={0x14, 0x3, "609ea0fcd724bb90f5a175bfecf3c389864c"}}]}) 14:36:20 executing program 4: mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:20 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000003800)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x251, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0x5, 0x7, 0x1, {0x22, 0xe93}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x7f, 0x0, 0x7f}}}}}]}}]}}, &(0x7f0000003c40)={0xa, &(0x7f0000003840)={0xa, 0x6, 0x200, 0x3f, 0x0, 0x71, 0x87}, 0xf, &(0x7f0000003880)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x1}]}, 0x8, [{0x4, &(0x7f00000038c0)=@lang_id={0x4, 0x3, 0x407}}, {0xa8, &(0x7f0000003900)=@string={0xa8, 0x3, "c91685236fcddb427d1b4b762298b529808c35291b4f8613f8ffed58d86ec1ae7688b118deeae185f051615c0f3e63bf3b49133d3fee7c38f9b40a015ee641c9d345548d8a4f2a1faca8ee96443221a778bd89188f68b1a31ad492921396191d01e9d9db14ec46a49768a67e860a5b9c9a70482779a1e7e499f4a65794bb874c2450d118ed2d63278f4785ee576e840f38aea507ebc58bdfeed3d2c91ddd7828803964ecb0d0"}}, {0x1e, &(0x7f0000003ac0)=@string={0x1e, 0x3, "8eaebea42dbdda837d642ca7b804b992bad4aca1830bbb3f1b04ca80"}}, {0x2, &(0x7f0000003b00)=@string={0x2}}, {0x4, &(0x7f0000003b40)=@lang_id={0x4, 0x3, 0x2c01}}, {0x4, &(0x7f0000003b80)=@lang_id={0x4}}, {0x4, &(0x7f0000003bc0)=@lang_id={0x4, 0x3, 0x44a}}, {0x0, 0x0}]}) 14:36:20 executing program 4: mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:20 executing program 3: syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x80300) syz_usb_connect$cdc_ecm(0x0, 0x5e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x4c, 0x1, 0x1, 0x1b, 0x0, 0x4, [{{0x9, 0x4, 0x0, 0x40, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "ec4b38"}, {0x5, 0x24, 0x0, 0x5}, {0xd, 0x24, 0xf, 0x1, 0x80000001, 0xa1a8, 0xff}, [@obex={0x5, 0x24, 0x15, 0x2}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x40, 0xe7, 0x3f, 0xbc}}], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x5, 0x0, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x1f, 0x0, 0x9}}}}}]}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x8f, &(0x7f0000000140)={0x5, 0xf, 0x8f, 0x5, [@ssp_cap={0x14, 0x10, 0xa, 0x2, 0x2, 0x0, 0x0, 0xff53, [0xf, 0x0]}, @ss_container_id={0x14, 0x10, 0x4, 0x3f, "65e1ab723993ee76373382e01b2660bc"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x2, 0x3, 0x101}, @generic={0x48, 0x10, 0x3, "b48ccf6fe8004f015ae36bc94fed5e9015d00ba624f81bd035cd1818f1a146663ab6ad8faa1b23622497ba3b75f9d49480f7d43f4be19ae001f1a478abb999c53d479da98c"}, @ssp_cap={0x10, 0x10, 0xa, 0xff, 0x1, 0x4, 0xf00, 0x20, [0x50]}]}, 0x5, [{0x0, 0x0}, {0x75, &(0x7f0000000780)=ANY=[]}, {0x2, &(0x7f0000000400)=@string={0x2}}, {0x5e, &(0x7f0000000600)=@string={0x5e, 0x3, "9fb9bad3f29048155cdd8019c29c32d7e9ac2c81a6fc2e66b80263f23624c7b7394f0e87bd97d1e2d77e0108b8980b86a2b657d224957902efe7f3ed35bc12239d2243d7ff2e67810ce34f01654ae960f97c4c91a544144f993a6809"}}, {0x0, 0x0}]}) syz_usb_ep_write(0xffffffffffffffff, 0x7e, 0x71, &(0x7f0000000000)="8b2d05995a1f246b1a64215403c5a1ac7af83cb2060d4b96af09bcda75e344ce1fab322072801f39b60f947b57771df2f35079c75fcb56e4b2a0ad6f3956b36d0097799730d1f4917f0f61e295d67858e98f9d34c4eaddf0c12646a8bbdd5eb0b316af0fb654323537eb3f6efeae6fa68d") syz_usb_connect$cdc_ecm(0x99b237c24b952d9, 0x0, 0x0, &(0x7f00000009c0)={0xa, &(0x7f0000000840)={0xa, 0x6, 0x0, 0x0, 0x0, 0x1f, 0x20}, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000900)=@string={0x2}}, {0x0, 0x0}]}) 14:36:20 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 203.789076][ T8503] loop4: detected capacity change from 0 to 224 14:36:20 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 203.962763][ T3639] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 203.977811][ T8507] loop4: detected capacity change from 0 to 224 [ 203.978295][ T3712] usb 2-1: new high-speed USB device number 12 using dummy_hcd 14:36:20 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 204.078320][ T22] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 204.128253][ T140] usb 6-1: new high-speed USB device number 11 using dummy_hcd [ 204.144956][ T8509] loop4: detected capacity change from 0 to 224 [ 204.158279][ T3707] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 204.238222][ T3749] usb 4-1: new high-speed USB device number 12 using dummy_hcd [ 204.238248][ T3712] usb 2-1: Using ep0 maxpacket: 16 [ 204.318197][ T22] usb 3-1: Using ep0 maxpacket: 8 [ 204.368267][ T140] usb 6-1: Using ep0 maxpacket: 16 [ 204.368410][ T3712] usb 2-1: config 1 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 127, changing to 10 [ 204.384907][ T3712] usb 2-1: config 1 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 204.398044][ T3712] usb 2-1: config 1 interface 0 has no altsetting 0 [ 204.428223][ T3707] usb 1-1: Using ep0 maxpacket: 16 [ 204.438560][ T22] usb 3-1: config 1 interface 0 altsetting 64 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 204.452519][ T22] usb 3-1: config 1 interface 0 has no altsetting 0 [ 204.488398][ T140] usb 6-1: config 1 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 127, changing to 10 [ 204.500074][ T22] usb 3-1: language id specifier not provided by device, defaulting to English [ 204.509126][ T3749] usb 4-1: Using ep0 maxpacket: 8 [ 204.514381][ T140] usb 6-1: config 1 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 204.527436][ T140] usb 6-1: config 1 interface 0 has no altsetting 0 [ 204.558341][ T3707] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 127, changing to 10 [ 204.569615][ T3707] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 204.583508][ T3712] usb 2-1: New USB device found, idVendor=05ac, idProduct=0251, bcdDevice= 0.40 [ 204.592766][ T3712] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 204.601339][ T3712] usb 2-1: Product: 꺎꒾봭菚摽ꜬҸ銹풺ꆬஃ㾻Л胊 [ 204.608937][ T3712] usb 2-1: Manufacturer: ᛉ⎅쵯䋛᭽癋頢⦵貀⤵伛ᎆ￸壭滘껁衶ᢱ藡凰屡㸏뽣䤻㴓㡼듹Ċ쥁䗓赔侊Ἢꢬ雮㉄꜡뵸ᢉ梏ꎱ퐚銒阓ᴙꑆ梗约આ鱛炚❈ꅹ垦뮔䲇値ᣑⷭ❣䞏湗྄길ޥ엫폮짒⡸㦀킰 [ 204.628257][ T3749] usb 4-1: config 1 interface 0 altsetting 64 has 3 endpoint descriptors, different from the interface descriptor's value: 0 [ 204.649104][ T3749] usb 4-1: config 1 interface 0 has no altsetting 0 [ 204.688624][ T140] usb 6-1: New USB device found, idVendor=05ac, idProduct=0251, bcdDevice= 0.40 [ 204.697690][ T140] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 204.706037][ T140] usb 6-1: Manufacturer: ᛉ⎅쵯䋛᭽癋頢⦵貀⤵伛ᎆ￸壭滘껁衶ᢱ藡凰屡㸏뽣䤻㴓㡼듹Ċ쥁䗓赔侊Ἢꢬ雮㉄꜡뵸ᢉ梏ꎱ퐚銒阓ᴙꑆ梗约આ鱛炚❈ꅹ垦뮔䲇値ᣑⷭ❣䞏湗྄길ޥ엫폮짒⡸㦀킰 [ 204.731305][ T140] usb 6-1: SerialNumber: 꺎꒾봭菚摽ꜬҸ銹풺ꆬஃ㾻Л胊 [ 204.908406][ T3749] usb 4-1: string descriptor 0 read error: -22 [ 204.914718][ T3749] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 204.929308][ T3749] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 204.959548][ T8505] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 204.967048][ T8505] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 204.979360][ T3749] cdc_ether: probe of 4-1:1.0 failed with error -22 [ 204.998531][ T3707] usb 1-1: New USB device found, idVendor=05ac, idProduct=0251, bcdDevice= 0.40 [ 205.008054][ T3707] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 205.016889][ T3707] usb 1-1: Product: 䆢릹냗ﻺ棉飋ຈ氹焊⚆ࣶ⃗沅炔駾쯝钡ꠂ⣛鞟灀鲫絯훶ﲠ륋炜䖜숐벐烻쉮ꑎdࣀꡆﻀ陜ᇶ댧鼧ζ闏ʴҾ੊ᇠ쌦乤岗꜅ꊲ厺黮ꠏ眣 [ 205.036895][ T3707] usb 1-1: SerialNumber: ࠒ [ 205.078490][ T3712] usbhid 2-1:1.0: can't add hid device: -71 [ 205.079071][ T22] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 205.084887][ T3712] usbhid: probe of 2-1:1.0 failed with error -71 [ 205.098925][ T22] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 205.105027][ T3712] usb 2-1: USB disconnect, device number 12 [ 205.112760][ T22] usb 3-1: SerialNumber: 뼄➬鍓辰䍉ꥦⵔ唺㞍脄쮱쎤䒤굪憞ꨤ儌ῦ蠌恴ⴴ댕㻈㾭㈶ˎ姞뜹ᐨ喣ꄫ쪑œꈬ咑ڀ㈿뙿콀甩❸₤통儒ᗹ뽩鲉ቴꍡ脋훐볐걹醃캋䅲犻㳄寲富풶鲍ὺ⚼魆읤맳룻懨龱㐘☫菳㕬坄蔦酮댮ញ [ 205.159159][ T8492] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 205.179095][ T140] usbhid 6-1:1.0: can't add hid device: -71 [ 205.185153][ T140] usbhid: probe of 6-1:1.0 failed with error -71 [ 205.193235][ T140] usb 6-1: USB disconnect, device number 11 [ 205.196713][ T1127] usb 4-1: USB disconnect, device number 12 [ 205.428985][ T22] cdc_ether: probe of 3-1:1.0 failed with error -22 [ 205.447356][ T22] usb 3-1: USB disconnect, device number 7 [ 205.518251][ T3707] usbhid 1-1:1.0: can't add hid device: -71 [ 205.524289][ T3707] usbhid: probe of 1-1:1.0 failed with error -71 [ 205.534117][ T3707] usb 1-1: USB disconnect, device number 11 14:36:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000067c0)=[{&(0x7f0000002380)={0x14, 0x3a, 0x5455fac2be721665, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 14:36:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@deltaction={0x24, 0x31, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x24}}, 0x0) [ 205.816219][ T8513] loop4: detected capacity change from 0 to 224 14:36:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000006840)={0x0, 0x0, &(0x7f00000067c0)=[{&(0x7f00000045c0)={0x10, 0x1d, 0x5455fac2be721665}, 0x10}], 0x1}, 0x0) 14:36:22 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000003800)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x251, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x40, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0x5}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x7f, 0x20, 0x7f}}}}}]}}]}}, &(0x7f0000003c40)={0x0, 0x0, 0x5, &(0x7f0000003880)={0x5, 0xf, 0x5}, 0x8, [{0x4, &(0x7f00000038c0)=@lang_id={0x4, 0x3, 0x407}}, {0x0, 0x0}, {0x4, &(0x7f0000003a80)=@lang_id={0x4}}, {0x0, 0x0}, {0x0, 0x0}, {0x4, &(0x7f0000003b40)=@lang_id={0x4}}, {0x4, &(0x7f0000003b80)=@lang_id={0x4, 0x3, 0x40e}}, {0x0, 0x0}]}) 14:36:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, @multicast1}]}, 0x24}}, 0x0) 14:36:22 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:22 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r1]}, 0x80) syz_open_dev$vcsa(&(0x7f00000004c0), 0x7fffffff, 0x40) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 14:36:22 executing program 3: r0 = socket(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) [ 205.923514][ T8522] loop4: detected capacity change from 0 to 224 14:36:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0xa, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000000)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x3}}}, 0x24}}, 0x0) 14:36:22 executing program 5: socket(0x3, 0x0, 0x401) 14:36:22 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:22 executing program 3: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@noquota}, {@nodiscard}, {@gqnoenforce}]}) [ 206.033711][ T8535] loop4: detected capacity change from 0 to 224 [ 206.094067][ T3639] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 206.188179][ T22] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 206.428182][ T22] usb 2-1: Using ep0 maxpacket: 16 [ 206.548457][ T22] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 207.118246][ T22] usb 2-1: New USB device found, idVendor=05ac, idProduct=0251, bcdDevice= 0.40 [ 207.127412][ T22] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 207.411001][ T22] usbhid 2-1:1.0: couldn't find an input interrupt endpoint [ 207.419899][ T22] usb 2-1: USB disconnect, device number 13 14:36:24 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) shutdown(r0, 0x1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:36:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc}, @NL80211_ATTR_COOKIE={0xc}]}, 0x2c}}, 0x0) 14:36:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:24 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 14:36:24 executing program 3: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:24 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x275a, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000180), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6, 0x30}, 0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x600000}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x3}) 14:36:24 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:24 executing program 3: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "d98bc2892a6066d417013d4fa7c4b6f5c326d8c448e228f28363aaf2ea77b5e3"}) 14:36:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:24 executing program 5: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 14:36:24 executing program 0: socketpair(0x22, 0x2, 0x3, 0x0) 14:36:25 executing program 1: sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40050}, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000840)={0x188, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x430}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @private1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7b3, @ipv4={'\x00', '\xff\xff', @dev}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffa2d7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @mcast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4080}, 0xc) 14:36:25 executing program 3: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000880), 0x200002, 0x0) 14:36:25 executing program 5: socket(0x2, 0x0, 0x40000) 14:36:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:25 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0xc020660b) 14:36:25 executing program 2: mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)) 14:36:25 executing program 0: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000015c0)=[0x1, 0x9]) 14:36:25 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@audit}]}}) 14:36:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000b40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b00)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 14:36:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:25 executing program 3: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x0, 0x0, 0xffffffffffffffff, 0xee01, 0xee01}}) 14:36:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8911, &(0x7f0000000040)={'syz_tun\x00'}) [ 208.869114][ T8590] loop4: detected capacity change from 0 to 136 14:36:25 executing program 1: sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40050}, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000840)={0x188, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x430}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @private1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7b3, @ipv4={'\x00', '\xff\xff', @dev}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffa2d7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @mcast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4080}, 0xc) 14:36:25 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, r0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x240400d1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x168000, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r3, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2084}, 0x10) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0xc) 14:36:25 executing program 3: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc) 14:36:25 executing program 2: syz_io_uring_setup(0x435a, &(0x7f0000000040)={0x0, 0x602b}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) 14:36:25 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x5452) [ 208.915843][ T8590] isofs_fill_super: get root inode failed 14:36:25 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f00000052c0)={0x0, 0x0, 0x0}, 0x0) 14:36:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 14:36:25 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x2c, r0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_MAX_FRAME_RETRIES={0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'wpan0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x240400d1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan3\x00'}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000840)={0x244, 0x0, 0x800, 0x70bd2a, 0x0, {}, [@TIPC_NLA_MEDIA={0x70, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8158}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xf0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x200, @loopback}}, {0x14, 0x2, @in={0x2, 0x0, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x9, @private1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x37}}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @mcast1, 0x80000001}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff81}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb4a}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4080}, 0x0) 14:36:25 executing program 2: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8005, 0x0, 0x0, 0x0) 14:36:25 executing program 1: sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40050}, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000840)={0x188, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x430}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @private1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7b3, @ipv4={'\x00', '\xff\xff', @dev}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffa2d7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @mcast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4080}, 0xc) 14:36:25 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8922, &(0x7f0000000040)={'syz_tun\x00'}) 14:36:25 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x24, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_MAX_FRAME_RETRIES={0x5}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'wpan0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x3c, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xcd88c7aa34991d33}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40050}, 0x240400d1) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x168000, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r2, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2084}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan3\x00'}) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) [ 209.054994][ T8609] loop4: detected capacity change from 0 to 136 14:36:25 executing program 5: semget(0x3, 0x0, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f00000052c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x44) 14:36:25 executing program 2: mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}]}}) 14:36:25 executing program 1: sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40050}, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000840)={0x188, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x430}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @private1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7b3, @ipv4={'\x00', '\xff\xff', @dev}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffa2d7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @mcast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4080}, 0xc) 14:36:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:26 executing program 0: syz_open_dev$sg(&(0x7f0000000000), 0x7fffffffffffffff, 0x591002) [ 209.111149][ T8609] isofs_fill_super: get root inode failed [ 209.142500][ T8620] syz_tun: mtu less than device minimum 14:36:26 executing program 3: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), 0xffffffffffffffff) 14:36:26 executing program 5: syz_clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8) 14:36:26 executing program 2: sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x40050}, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x168000, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0xc) 14:36:26 executing program 0: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x15) 14:36:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0xc) 14:36:26 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f00000052c0)={0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000001440)={0x10}, 0x10}], 0x1}, 0x0) [ 209.242152][ T8632] loop4: detected capacity change from 0 to 136 [ 209.276035][ T8632] isofs_fill_super: get root inode failed 14:36:26 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) 14:36:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000740)={&(0x7f0000000300), 0xc, &(0x7f0000000700)={&(0x7f0000000340)={0x14, 0x17, 0xa, 0x5}, 0x14}}, 0x0) 14:36:26 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f00000052c0)={0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000001440)={0x818, 0x0, 0x0, 0x0, 0x25dfdbfd, "", [@generic="a9352e9649a6475f36809cd20babca543a09536bb34d23f0004457e04428d5f4e9b89cac6736ff832a4ddb3d315ed55449017125632e3561ef49629d66cb035d11dd2c9f3f890326f62f0bf399fb260b58caa3ccfcc8d6f3a9d68bf1d7b098b29568c49a6ac719c29a4a0c8b8afe4cbdf924b697eb148ab4827411d5263be4f1f40388b5c11dd1652e746520ebaaaf3aad9f3a8bdd", @nested={0x70, 0x7c, 0x0, 0x1, [@typed={0x23, 0x42, 0x0, 0x0, @binary="763cba1106eefea1b56e7b23d7a6b8116d9c8a2fa631832ecff62d1737fded"}, @generic="4067f88eb07ab6f4cbef8f585454a3b0bcfb4ae8a4e7d617807d100de18b53f530b7cf13dc903dcb31d680b6663af7149c402b5afd6d134d9cd8b3dcdef593c189df21817074d1e5"]}, @typed={0x8, 0x51, 0x0, 0x0, @ipv4=@multicast1}, @generic="67b97b0d1d69270dad902674a0247fd95c02ee33e3a17586c93fbfdb83f8f28bd0ed1a83e7578703ad282ccaa824e56630136b249ff5317bcd3a70bee25801ed5a4b95885716fcaf9bc01d82afc74663fed633c90fee01e608f219ab2447ec2d444049ee9fb88296aa", @generic="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", @generic="a9fa8744290e4dc2e18140060e7faae9d0eb41e043b4ea649ce49f3885f5216e92", @generic]}, 0x818}, {&(0x7f0000002940)={0x1cc, 0x2f, 0x20, 0x0, 0x0, "", [@generic="ab0a09a1f03b4db385200df56142b09a63dee68223fc8ca15a66d2039cd20aa0372c33209b6f1b41f0f4eb9d28b16948d840cdf3c77865e6dbf7d7cc545db9e7650e10614815e380642f41833e9bd78d7c2669a1d5ddaff6a2fbf648d579a3bd1f1aff3689ba", @typed={0xc, 0x0, 0x0, 0x0, @u64=0x4}, @typed={0x14, 0x3d, 0x0, 0x0, @ipv6=@local}, @generic="bc241ec48a8e78ddc0529d6aed924ab0661cd88dfedce23ed0e7836c254fb03d9dcdfef4b379394a49d4cfd9cf0084ca6b1a839996a4b6da147d66d6a7b8c3024953b068ed14f8e29be9c6008226d2e6356f26209795143182b79c0c7eb6eac83e3f5abcf60e29fe69248c606264a1bf5785693d", @nested={0xc, 0x14, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @generic="b6a08c22b1a52894f70f2909d307a6b4090bc44222cb88700747", @generic, @typed={0x5, 0x2, 0x0, 0x0, @str='\x00'}, @generic="a8f73196d20dfc0ac631cec9e7533f1b01cfe2424c394e542e3612a6d2f79e7abdbc86729757c01891018e2e09481a47fd71a706cb04ca4f7b2eadc9e45c2101112a15c321f27a185af38d361ae98eec80bd1dc4291cf647f72c944d908f5ccf699ee4d7106428706bfd93c263b0fea0437113e398deb1d28fe73aa3ccbc30a6bbd1f7f5d1e72630260cdebb5b2f091c09df43"]}, 0x1cc}, {&(0x7f0000002c80)={0x18, 0x3a, 0x400, 0x70bd28, 0x25dfdbfe, "", [@typed={0x4, 0x4}, @typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x18}, {&(0x7f0000002d40)={0x4d8, 0x20, 0x1, 0x0, 0x25dfdbff, "", [@generic, @nested={0xc, 0x32, 0x0, 0x1, [@typed={0x8, 0x5, 0x0, 0x0, @uid}]}, @generic="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"]}, 0x4d8}, {0x0}, {&(0x7f0000003f40)={0x10, 0x0, 0x300, 0x0, 0x25dfdbfe}, 0x10}, {0x0}, {0x0}, {&(0x7f0000005000)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x9, 0x0, 0x0, 0x6}, 0x44) 14:36:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8910, &(0x7f0000000040)={'syz_tun\x00'}) 14:36:26 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000), 0x101, 0x0) 14:36:26 executing program 2: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f00000002c0)=[{0x1, 0x401, 0x1800}, {}], 0x2) 14:36:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8913, &(0x7f0000000040)={'syz_tun\x00'}) 14:36:26 executing program 0: socket(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) 14:36:26 executing program 3: sched_setattr(0x0, &(0x7f0000000080)={0x38}, 0x0) [ 209.415582][ T8648] loop4: detected capacity change from 0 to 224 [ 209.447433][ T8648] isofs_fill_super: get root inode failed 14:36:26 executing program 1: r0 = getpgrp(0x0) get_robust_list(r0, 0x0, 0x0) 14:36:26 executing program 5: syz_clone(0x40020000, &(0x7f00000000c0)="31199f5383adcf54288650fc863d1aeca0861c6e018b495aa36a0568a08d2c86549bf5b4a96954090e5dfb2b359df7648fa15459", 0x34, &(0x7f0000000140), 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x401, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'geneve1\x00'}) 14:36:26 executing program 3: unlink(&(0x7f0000000040)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) 14:36:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:26 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000050cb5320450c10108e490102030109021b"], 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)='A', 0x1) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(r0) 14:36:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)) 14:36:26 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f00000002c0)=[{0x0, 0x401, 0x1800}], 0x1) 14:36:26 executing program 1: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000800)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) [ 209.623400][ T8679] loop4: detected capacity change from 0 to 224 14:36:26 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) 14:36:26 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000003c0)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 14:36:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 209.669577][ T8679] isofs_fill_super: get root inode failed 14:36:26 executing program 0: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x1, &(0x7f0000003080)=[{&(0x7f0000000f00)="eccc7c7c", 0x4, 0x3}], 0x0, 0x0) 14:36:26 executing program 3: r0 = getpgrp(0x0) get_robust_list(r0, &(0x7f0000001040)=0x0, &(0x7f0000001080)) [ 209.790756][ T8693] loop4: detected capacity change from 0 to 224 14:36:26 executing program 5: r0 = io_uring_setup(0x7ae4, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:36:26 executing program 0: syz_io_uring_setup(0x7e0a, &(0x7f0000000100)={0x0, 0x897b}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 14:36:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x1, 0x5}]}, &(0x7f0000000a80)='syzkaller\x00', 0x5, 0xf5, &(0x7f0000000ac0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 209.838942][ T8693] isofs_fill_super: get root inode failed [ 209.891478][ T14] usb 3-1: new high-speed USB device number 8 using dummy_hcd [ 209.968389][ T22] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 210.158402][ T14] usb 3-1: Using ep0 maxpacket: 32 [ 210.168319][ T22] usb 2-1: device descriptor read/64, error 18 [ 210.288286][ T14] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 210.298568][ T14] usb 3-1: config 0 has no interfaces? [ 210.438349][ T22] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 210.478518][ T14] usb 3-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 210.488695][ T14] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 210.496700][ T14] usb 3-1: Product: syz [ 210.501044][ T14] usb 3-1: Manufacturer: syz [ 210.505646][ T14] usb 3-1: SerialNumber: syz [ 210.512723][ T14] usb 3-1: config 0 descriptor?? [ 210.628186][ T22] usb 2-1: device descriptor read/64, error 18 [ 210.749353][ T22] usb usb2-port1: attempt power cycle [ 210.761165][ T3749] usb 3-1: USB disconnect, device number 8 [ 211.158246][ T22] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 211.248407][ T22] usb 2-1: Invalid ep0 maxpacket: 0 [ 211.398179][ T22] usb 2-1: new high-speed USB device number 17 using dummy_hcd 14:36:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f0000000a00)=@framed={{}, [@jmp={0x5, 0x0, 0x5}]}, &(0x7f0000000a80)='syzkaller\x00', 0x5, 0xf5, &(0x7f0000000ac0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200), 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000080), 0x1) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) recvmsg$unix(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)}, 0x0) r2 = io_uring_setup(0x0, &(0x7f0000000540)) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(0xffffffffffffffff, 0x50009401, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000011c0), r1) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) [ 211.479311][ T8710] loop4: detected capacity change from 0 to 224 [ 211.488442][ T22] usb 2-1: Invalid ep0 maxpacket: 0 [ 211.494259][ T22] usb usb2-port1: unable to enumerate USB device [ 211.503933][ T8710] isofs_fill_super: get root inode failed 14:36:29 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x19[\xd8\x8a\xa7\xbe$%\x00\x00\x00\x00\x00\x00\x00#\x83\\\xc9\x95\x81\xa1\xee\x1a\xea\xb1\x1e\xe2\xb6\xa3\xc2\x13\xb5of\x92\x19\xcd\xb6HEn&\xa0\xe4\xaf\xb6\x1b\xaf\x15\r\xd4h\xe4(\xeb\xe33UB#\xb5\xf3\xfa\xa2pVN\x15y\x9d\xab\x1c\xb61\x9d\x02\xaf', 0x0) r1 = io_uring_setup(0x767a, &(0x7f0000000540)) tee(r1, r0, 0x400, 0x0) 14:36:29 executing program 3: openat$tcp_congestion(0xffffff9c, &(0x7f00000011c0), 0x1, 0x0) 14:36:29 executing program 5: syz_clone3(&(0x7f0000000180)={0xa000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:36:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200), 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:29 executing program 2: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x26000) 14:36:29 executing program 0: syz_io_uring_setup(0x6998, &(0x7f00000000c0)={0x0, 0x0, 0x7}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 14:36:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r2, r0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 14:36:29 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') fgetxattr(r0, 0x0, 0x0, 0x0) 14:36:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x1, &(0x7f0000000b00)=@raw=[@generic={0x6}], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 212.712895][ T8723] loop4: detected capacity change from 0 to 224 14:36:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x234, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 14:36:29 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000540)) 14:36:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@newtaction={0x14}, 0x14}}, 0x0) 14:36:29 executing program 0: syz_clone3(&(0x7f00000014c0)={0x20200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:36:29 executing program 2: syz_clone3(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, {0x900}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 212.788631][ T8723] isofs_fill_super: get root inode failed 14:36:29 executing program 1: bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0), 0x4) 14:36:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200), 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:29 executing program 5: r0 = socket(0x2, 0x3, 0x1) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 14:36:29 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x71}, 0x20) 14:36:29 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000600)={0xffffffff}, 0x8) 14:36:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000000)=@raw=[@alu={0x6}], &(0x7f0000000040)='GPL\x00', 0x3, 0x92, &(0x7f0000000080)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:29 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c) 14:36:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002dc0)={0x11, 0x3, &(0x7f0000002bc0)=@framed, &(0x7f0000002c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') fgetxattr(r0, &(0x7f0000000100)=@known='security.apparmor\x00', &(0x7f0000000140)=""/4096, 0x1000) 14:36:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[], 0xa, 0xfffffffffffffffd) 14:36:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001a40)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) 14:36:29 executing program 5: r0 = openat$autofs(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18}, '\x00'}) 14:36:29 executing program 0: ustat(0x2, &(0x7f0000001d80)) [ 213.001717][ T8758] loop4: detected capacity change from 0 to 224 [ 213.031612][ T8758] isofs_fill_super: get root inode failed 14:36:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000200)=@proc={0x10, 0x0, 0x0, 0x10000}, 0xc) 14:36:29 executing program 2: bpf$BPF_MAP_FREEZE(0xa, &(0x7f00000001c0), 0x4) 14:36:29 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="095095e69107d6148e"], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f", 0x45, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000040)={0x38, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x38}}, 0x0) 14:36:29 executing program 2: memfd_create(&(0x7f0000000000)='target default\x00', 0x5) 14:36:30 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x5]}, 0x8}) 14:36:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) sendmsg$unix(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[], 0x48}, 0x0) 14:36:30 executing program 0: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000b80)='L\xc5&\\-+$}{\x00', 0x0) 14:36:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 14:36:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 14:36:30 executing program 1: epoll_pwait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x0, 0x0, 0x0) [ 213.231553][ T8788] loop4: detected capacity change from 0 to 224 14:36:30 executing program 3: bpf$BPF_MAP_FREEZE(0x22, &(0x7f00000001c0), 0x4) 14:36:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f0000000a00)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000a80)='syzkaller\x00', 0x5, 0xf5, &(0x7f0000000ac0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 213.286227][ T8788] ISOFS: unable to read i-node block 56 [ 213.314073][ T8788] isofs_fill_super: get root inode failed 14:36:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f", 0x45, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:30 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') fgetxattr(r0, &(0x7f0000000100)=@known='security.apparmor\x00', 0x0, 0x0) 14:36:30 executing program 1: bpf$BPF_MAP_FREEZE(0x9, &(0x7f00000001c0), 0x4) 14:36:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[], 0x50}}, 0x0) [ 213.466619][ T8812] loop4: detected capacity change from 0 to 224 [ 213.481924][ T8812] ISOFS: unable to read i-node block 56 [ 213.487820][ T8812] isofs_fill_super: get root inode failed 14:36:30 executing program 5: r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = io_uring_setup(0x767a, &(0x7f0000000540)) tee(r1, r0, 0x1000, 0x0) 14:36:30 executing program 3: bpf$PROG_LOAD_XDP(0x7, &(0x7f0000000e80)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$smc(&(0x7f0000000100), r0) 14:36:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x24}}, 0x0) 14:36:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f0000000340)=[{}, {0x3}]}) 14:36:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f", 0x45, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 14:36:30 executing program 3: memfd_create(&(0x7f0000000080)='/\x1fev/vga_arbite\t\x00', 0x0) 14:36:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, 0x0, 0x0, 0x0, &(0x7f0000007480)) [ 214.113956][ T8823] loop4: detected capacity change from 0 to 224 14:36:31 executing program 5: syz_clone3(&(0x7f0000000440)={0x4080000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sched_rr_get_interval(0x0, &(0x7f0000000000)) 14:36:31 executing program 1: r0 = io_uring_setup(0x767a, &(0x7f0000000540)) r1 = io_uring_setup(0x767a, &(0x7f0000000540)) dup3(r0, r1, 0x0) 14:36:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000000)=@raw=[@alu={0x6, 0x0, 0x9}], &(0x7f0000000040)='GPL\x00', 0x3, 0x92, &(0x7f0000000080)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:31 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) 14:36:31 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 14:36:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 14:36:31 executing program 1: syz_clone3(&(0x7f0000000740)={0x1210000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:36:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f0000000a00)=@framed={{}, [@jmp={0x5, 0x0, 0x5, 0x0, 0x1}]}, &(0x7f0000000a80)='syzkaller\x00', 0x5, 0xf5, &(0x7f0000000ac0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 214.228852][ T8823] ISOFS: unable to read i-node block 56 [ 214.261492][ T8823] isofs_fill_super: get root inode failed 14:36:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a", 0x67, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:31 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 14:36:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, 0x0) 14:36:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f0000000a00)=@framed={{}, [@jmp={0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000a80)='syzkaller\x00', 0x5, 0xf5, &(0x7f0000000ac0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:31 executing program 1: r0 = syz_io_uring_setup(0x3db3, &(0x7f0000000000)={0x0, 0x20fe}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000100)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 14:36:31 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0xa}]}, &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:31 executing program 2: syz_clone3(&(0x7f0000000880)={0x111105000, 0x0, 0x0, &(0x7f0000000600), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:36:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40d1) 14:36:31 executing program 5: openat$ttyS3(0xffffff9c, &(0x7f0000000080), 0x8880, 0x0) 14:36:31 executing program 1: r0 = openat$hwrng(0xffffff9c, &(0x7f0000004600), 0x0, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 14:36:31 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000600), 0x10) 14:36:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a", 0x67, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 214.430296][ T8861] loop4: detected capacity change from 0 to 224 [ 214.468946][ T8861] ISOFS: unable to read i-node block 56 14:36:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r0, 0x0) 14:36:31 executing program 2: socketpair(0x28, 0x0, 0x1d, &(0x7f0000000040)) 14:36:31 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x1) 14:36:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:36:31 executing program 5: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='e', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) [ 214.468993][ T8861] isofs_fill_super: get root inode failed [ 214.541262][ T8874] loop4: detected capacity change from 0 to 224 14:36:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x15, 0x2, &(0x7f0000000bc0)=@raw=[@btf_id], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:31 executing program 1: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc04c5609, &(0x7f0000000080)={0x0, 0xa, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "68a8567e"}}) 14:36:31 executing program 3: io_uring_setup(0xb1b, &(0x7f0000000080)={0x0, 0x0, 0x4}) 14:36:31 executing program 2: syz_io_uring_setup(0x5943, &(0x7f0000000000)={0x0, 0x0, 0x20}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) 14:36:31 executing program 1: msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/4096) 14:36:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340), r0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/uts\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) [ 214.621947][ T8874] ISOFS: unable to read i-node block 56 [ 214.644512][ T8874] isofs_fill_super: get root inode failed 14:36:31 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) openat$vim2m(0xffffff9c, &(0x7f0000000440), 0x2, 0x0) 14:36:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a", 0x67, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:31 executing program 3: r0 = openat$vmci(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000180)) 14:36:31 executing program 2: sigaltstack(&(0x7f0000000140)={0x0, 0x80000002}, 0x0) 14:36:31 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) 14:36:31 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) openat$vim2m(0xffffff9c, &(0x7f0000000440), 0x2, 0x0) 14:36:31 executing program 3: openat$proc_capi20ncci(0xffffff9c, &(0x7f00000015c0), 0x108c02, 0x0) 14:36:31 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc01c7c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) 14:36:31 executing program 1: openat$sndseq(0xffffff9c, &(0x7f0000000840), 0x0) [ 214.800013][ T8903] loop4: detected capacity change from 0 to 224 14:36:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) 14:36:31 executing program 5: openat$ubi_ctrl(0xffffff9c, 0x0, 0x0, 0x0) openat$dsp(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) 14:36:31 executing program 3: socketpair(0x2b, 0x1, 0x7, &(0x7f0000000580)) 14:36:31 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) [ 214.876898][ T8903] ISOFS: unable to read i-node block 56 [ 214.911984][ T8903] isofs_fill_super: get root inode failed 14:36:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec", 0x78, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:31 executing program 1: syz_open_dev$rtc(&(0x7f0000000ec0), 0x0, 0x0) 14:36:31 executing program 2: openat$uinput(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioperm(0x8001, 0x7, 0x0) 14:36:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'sit0\x00', 0x0}) 14:36:31 executing program 3: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0xa0) 14:36:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$fuse(0xffffff9c, &(0x7f0000003600), 0x2, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x3c}}, 0x0) 14:36:31 executing program 2: process_vm_readv(0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/95, 0x5f}, {0x0}], 0x2, 0x0, 0x0, 0x0) 14:36:31 executing program 0: syz_open_dev$vcsa(&(0x7f0000000840), 0x0, 0x20000) 14:36:31 executing program 1: openat$dsp(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) 14:36:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private1, @in6=@dev}, {@in6=@loopback, 0x0, 0x6c}, @in6=@empty}}}, 0xf8}}, 0x22000800) 14:36:31 executing program 5: socketpair(0x2b, 0x1, 0x0, &(0x7f0000000580)) 14:36:31 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x121180) [ 215.058031][ T8936] loop4: detected capacity change from 0 to 224 [ 215.144732][ T8936] ISOFS: unable to read i-node block 56 [ 215.155793][ T8936] isofs_fill_super: get root inode failed 14:36:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec", 0x78, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:32 executing program 1: sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x0) 14:36:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) 14:36:32 executing program 2: r0 = gettid() process_vm_readv(r0, &(0x7f00000010c0)=[{0x0}, {&(0x7f00000000c0)=""/4096, 0x1000}], 0x2, &(0x7f0000001440)=[{&(0x7f0000001100)=""/195, 0xc3}, {&(0x7f0000001200)=""/87, 0x57}], 0x2, 0x0) 14:36:32 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000200), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) 14:36:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local}}) 14:36:32 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x28, 0x0, &(0x7f00000000c0)) 14:36:32 executing program 1: r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000000600), 0x200000, 0x0) close$fd_v4l2_buffer(r0) 14:36:32 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000ec0), 0x0, 0x0) ioctl$RTC_PLL_SET(r0, 0x401c7012, 0x0) 14:36:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) [ 215.267155][ T8957] sp0: Synchronizing with TNC 14:36:32 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) fsmount(0xffffffffffffffff, 0x1, 0x0) syz_io_uring_setup(0x2086, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 14:36:32 executing program 3: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000003680)=""/65) [ 215.332998][ T8965] loop4: detected capacity change from 0 to 224 [ 215.387310][ T8965] ISOFS: unable to read i-node block 56 [ 215.413475][ T8965] isofs_fill_super: get root inode failed 14:36:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec", 0x78, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:32 executing program 1: r0 = openat$binderfs(0xffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 14:36:32 executing program 5: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "a7ae9f", "b2949c1d00719191a99ddfc366c4324fbb92e93167beb4e9f42bab89b2f566565f224fa9a0bbedb51dce5337354b5c835be26e45620776e4acf0d516de81041cb991077ad1e403dbbfa105a78ac5de94cf94e07817d553ea7ab7b6bf0e532e9719967544a9885fd523f64677c6f124cf8d7eca88541a5cc18da62593df5aec9fd0010190e8a71de5d24706f96eab79c47189763f0a04ab5e04ea4cba3ec316db513cd1c600bbeed754598df156f99d7a153deecb7bba98394ac63dc5e08239e7767addb9e91cde4c7e4870712fa24dfe9f5589fb5aae9f61291fb34417439d6d350d73109371c03bc7d12d21e99231abb58fa592e98792d901279dfc65423687"}}, 0x110) 14:36:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @empty}}) 14:36:32 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) 14:36:32 executing program 2: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) openat$vmci(0xffffff9c, &(0x7f00000034c0), 0x2, 0x0) 14:36:32 executing program 0: r0 = openat$damon_kdamond_pid(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) read$hidraw(r0, &(0x7f0000000e00)=""/4096, 0x1000) 14:36:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000180)=""/45, &(0x7f00000001c0)=0x2d) 14:36:32 executing program 3: socket(0x1, 0x0, 0x800000) 14:36:32 executing program 2: io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000017c0)=[0x0]) [ 215.523058][ T8980] binder: 8978:8980 ioctl c0306201 0 returned -14 14:36:32 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='syztnl0\x00', 0x8) 14:36:32 executing program 1: openat$userio(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 215.578056][ T8990] loop4: detected capacity change from 0 to 224 [ 215.632809][ T8990] ISOFS: unable to read i-node block 56 [ 215.649872][ T8990] isofs_fill_super: get root inode failed 14:36:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001", 0x81, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:32 executing program 5: r0 = openat$vcsa(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 14:36:32 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) 14:36:32 executing program 1: r0 = openat$fuse(0xffffff9c, &(0x7f00000035c0), 0x2, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000003600), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000003640)=r1) 14:36:32 executing program 0: openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000000), 0x48a43, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000380), 0xc0402, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000000200)) getegid() getegid() gettid() openat$damon_target_ids(0xffffff9c, &(0x7f00000000c0), 0x0, 0x24) io_setup(0x2c42, &(0x7f0000000200)) 14:36:32 executing program 1: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000040)=""/4096) 14:36:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:36:32 executing program 3: openat$sndtimer(0xffffff9c, &(0x7f00000000c0), 0x0) 14:36:32 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x4300, 0x4) 14:36:32 executing program 1: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/210) [ 215.808898][ T9013] loop4: detected capacity change from 0 to 224 14:36:32 executing program 3: semget(0x2, 0xf4435b8a87cddc, 0x0) 14:36:32 executing program 2: openat$cgroup_root(0xffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 215.849650][ T9013] ISOFS: unable to read i-node block 56 [ 215.873770][ T9013] isofs_fill_super: get root inode failed 14:36:32 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc08c5332, &(0x7f0000000000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff, 0x0, 0x500}}) 14:36:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x18, 0x1e, 0x1}, 0x18}}, 0x0) 14:36:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='comm\x00') read$FUSE(r0, 0x0, 0x0) 14:36:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001", 0x81, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x8100}, 0x0) 14:36:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0x10000, 0x4) 14:36:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x17, 0x6a, 0x1}, 0x18}}, 0x0) 14:36:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000000)={@rand_addr, @broadcast}, &(0x7f0000000040)=0xfffffffffffffe96) 14:36:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$bt_sco(r0, &(0x7f0000000140)={0xa}, 0x8) 14:36:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0xca000000, 0x0, 0x0, 0x2}}, &(0x7f0000000440)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:36:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x18, 0x13, 0x1}, 0x18}}, 0x0) 14:36:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x81000000}, 0x0) 14:36:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5}}]}}, &(0x7f0000000440)=""/203, 0x32, 0xcb, 0x1}, 0x20) [ 216.040834][ T9042] loop4: detected capacity change from 0 to 224 14:36:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000440)=""/203, 0x32, 0xcb, 0x1}, 0x20) [ 216.103202][ T9042] ISOFS: unable to read i-node block 56 [ 216.129843][ T9042] isofs_fill_super: get root inode failed 14:36:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001", 0x81, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000100), 0x4) 14:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x1c, 0x6a, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}]}, 0x1c}}, 0x0) 14:36:33 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc08c5332, &(0x7f0000000000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}}) 14:36:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x18, 0x2a, 0x1}, 0x18}}, 0x0) 14:36:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cc0000003100ffff000000000000000000000000b80001006c0001000b000100706f6c696365"], 0xcc}}, 0x0) 14:36:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x38}, 0x0) 14:36:33 executing program 0: socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fdinfo/3\x00') 14:36:33 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc08c5332, &(0x7f0000000000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}}) [ 216.243872][ T9064] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 216.281924][ T9064] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 14:36:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) 14:36:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cc0000003100ffff000000000000000000000000b80001006c0001000b000100706f6c696365"], 0xcc}}, 0x0) 14:36:33 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000000100)=0x1, 0x4) [ 216.304052][ T9068] loop4: detected capacity change from 0 to 224 [ 216.373674][ T9068] ISOFS: unable to read i-node block 56 [ 216.381746][ T9068] isofs_fill_super: get root inode failed [ 216.391197][ T9075] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 14:36:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:33 executing program 1: socketpair(0x11, 0xa, 0x7, &(0x7f0000000140)) 14:36:33 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc08c5332, &(0x7f0000000000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}}) 14:36:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp, @timestamp, @mss], 0x4) 14:36:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000000)=0x10000, 0x4) 14:36:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cc0000003100ffff000000000000000000000000b80001006c0001000b000100706f6c696365"], 0xcc}}, 0x0) [ 216.417115][ T9075] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 14:36:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x18, 0x5e, 0x1}, 0x18}}, 0x0) 14:36:33 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x68, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0x68}}, 0x0) 14:36:33 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc08c5332, &(0x7f0000000000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}}) [ 216.476131][ T9087] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 216.514583][ T9089] TCP: TCP_TX_DELAY enabled 14:36:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), 0x4) 14:36:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x17}, 0x17}}, 0x0) [ 216.543136][ T9093] loop4: detected capacity change from 0 to 224 [ 216.543796][ T9087] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 14:36:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$bt_sco(r0, &(0x7f0000000140), 0x8) [ 216.594867][ T9093] ISOFS: unable to read i-node block 56 [ 216.648639][ T9093] isofs_fill_super: get root inode failed 14:36:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x18, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 14:36:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cc0000003100ffff000000000000000000000000b80001006c0001000b000100706f6c696365"], 0xcc}}, 0x0) 14:36:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x5) 14:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x18}, 0xfffffdef}}, 0x0) 14:36:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9030e010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x25, 0x10}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400040d0}, 0x1) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340), r0) syz_clone(0x71804000, &(0x7f00000003c0)="d4e80cbc654119a473c799003845ee1c7df4703c99c853db160be02f895087cba002288e425d860df73035ab5a378a247121dc7cbbc21b8bfe8a9e27a75b35950d75062ecc3768c4b504ac53df01d06f836285fc919aef12059b55fc373563986b64f46664b6ef2845a7aac14905cb525a8d28dd92007cd313a755bc95a89934aab3da8dc0e911b696bcb3c3f4d253edff9071784006fa36b04673b43e8f412d96a90f2ef05751641c2e23e2690a1a56ecaaf7d266aa0b0acec9bb955510", 0xbe, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="fdff270a8187526cc3d730cb5a42b376d60367ad7cd65a06387fdb5dfe8e7802e5c0e361acbe31ff146df73ce2e28abb408cf65bdea4b1") r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), r0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, 0x15, 0x800, 0x70bd26, 0x25dfdbff, {0x11, 0x2}, [@INET_DIAG_REQ_BYTECODE={0x1d, 0x1, "177cab782a7b48bb194527d36a39488480c60f803eb6261f3e"}]}, 0x34}, 0x1, 0x0, 0x0, 0x24040000}, 0x40004) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000007c0)={0x3f, 0x0, 0x10001}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r3, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000940), r0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80400010}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x58, r4, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, ']-&+()[@'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x15, 0xa, '/dev/vhost-vsock\x00'}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0xb, 0xa, 'ns/uts\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0xb, 0xa, 'ns/uts\x00'}]}, 0x58}}, 0x0) 14:36:33 executing program 5: syz_mount_image$udf(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000006c0)={[{@session}]}) 14:36:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x18, 0x6a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x18}}, 0x0) [ 216.738845][ T9111] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 14:36:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x18, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 14:36:33 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000200)=""/188) [ 216.785052][ T9117] loop4: detected capacity change from 0 to 224 [ 216.788203][ T9111] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 14:36:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) 14:36:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x18, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 216.872670][ T9117] ISOFS: unable to read i-node block 56 [ 216.885953][ T9117] isofs_fill_super: get root inode failed 14:36:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:33 executing program 1: syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@map_normal}, {@sbsector}, {@cruft}]}) 14:36:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9030e010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x25, 0x10}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400040d0}, 0x1) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340), r0) syz_clone(0x71804000, &(0x7f00000003c0)="d4e80cbc654119a473c799003845ee1c7df4703c99c853db160be02f895087cba002288e425d860df73035ab5a378a247121dc7cbbc21b8bfe8a9e27a75b35950d75062ecc3768c4b504ac53df01d06f836285fc919aef12059b55fc373563986b64f46664b6ef2845a7aac14905cb525a8d28dd92007cd313a755bc95a89934aab3da8dc0e911b696bcb3c3f4d253edff9071784006fa36b04673b43e8f412d96a90f2ef05751641c2e23e2690a1a56ecaaf7d266aa0b0acec9bb955510", 0xbe, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="fdff270a8187526cc3d730cb5a42b376d60367ad7cd65a06387fdb5dfe8e7802e5c0e361acbe31ff146df73ce2e28abb408cf65bdea4b1") r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), r0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, 0x15, 0x800, 0x70bd26, 0x25dfdbff, {0x11, 0x2}, [@INET_DIAG_REQ_BYTECODE={0x1d, 0x1, "177cab782a7b48bb194527d36a39488480c60f803eb6261f3e"}]}, 0x34}, 0x1, 0x0, 0x0, 0x24040000}, 0x40004) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000007c0)={0x3f, 0x0, 0x10001}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r3, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000940), r0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80400010}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x58, r4, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, ']-&+()[@'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x15, 0xa, '/dev/vhost-vsock\x00'}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0xb, 0xa, 'ns/uts\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0xb, 0xa, 'ns/uts\x00'}]}, 0x58}}, 0x0) 14:36:33 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:33 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[{@barrier_val}]}) 14:36:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x18, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 14:36:33 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x5, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x37) 14:36:33 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, &(0x7f00000016c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f00000016c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 217.054947][ T9144] loop4: detected capacity change from 0 to 224 14:36:33 executing program 2: add_key(&(0x7f0000000280)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 217.172471][ T9144] ISOFS: unable to read i-node block 56 [ 217.191361][ T9144] isofs_fill_super: get root inode failed 14:36:34 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:34 executing program 0: syz_clone(0x10400, 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:34 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000001680)={[{@nocompress}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 14:36:34 executing program 1: socketpair(0x11, 0x2, 0x800, &(0x7f0000000040)) 14:36:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f00000016c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc", 0x87, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:34 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:34 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000000800)=[{&(0x7f0000000680)='G', 0x1, 0xf864}, {&(0x7f0000000600)='U', 0x1, 0x80000000}, {&(0x7f0000000780)="81", 0x1}], 0x0, 0x0) 14:36:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 14:36:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f00000016c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 217.309428][ T9170] loop4: detected capacity change from 0 to 224 14:36:34 executing program 3: renameat2(0xffffffffffffff9c, &(0x7f00000008c0)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) 14:36:34 executing program 1: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) 14:36:34 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x800) 14:36:34 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 14:36:34 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000340), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f0000001380)={r0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3ec6483b78c584f31aded6893f156ee4c2874a0fb6b9fb1db5637093a08bbf8c71ada58cff4a93f10e00", "e954e8c1ac934d3675130923ce4e049ae6f0ff660e32640ba6de79e5c26cfa7ea751b048a1bbf7b31c1fb33db9c30a5194021c1c0d85512e01f83b9dfdc83e2f", "2bdb0959a5d3f2a8b805dbc4ed58a57971880919da9a50e1492967c343bf43d5"}}) 14:36:34 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) [ 217.407201][ T9170] ISOFS: unable to read i-node block 56 [ 217.423723][ T9170] isofs_fill_super: get root inode failed 14:36:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc", 0x87, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:34 executing program 2: socket(0x2, 0xa, 0x401) 14:36:34 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) sendmmsg$nfc_llcp(r0, 0x0, 0x0, 0x0) 14:36:34 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:34 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 14:36:34 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 14:36:34 executing program 3: renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0xb) 14:36:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "98637d37a094696cee9ab82d4d79423c05ff5216c21fd279cc655ebfea2b0e9e4dd8bffff94bd82a29bf24de487f3281983654952e307c22f58c4c3343c94f84", "5a551a54c3ac2ff5c8736a097025b39a3c38d57def1ead4a33cb769e26b442a3"}) 14:36:34 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:34 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "c1356b0a080000090cac00000000940200a774"}) writev(r0, &(0x7f0000001380)=[{0x0}, {&(0x7f0000000380)="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", 0x788}], 0x2) [ 217.589895][ T9202] loop4: detected capacity change from 0 to 224 14:36:34 executing program 3: socketpair(0x23, 0x80000, 0x400, &(0x7f0000000e80)) [ 217.661582][ T9202] ISOFS: unable to read i-node block 56 [ 217.692795][ T9202] isofs_fill_super: get root inode failed 14:36:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc", 0x87, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:34 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:34 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x814}, 0x48) 14:36:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "c1356b0a080000090cac00000000940200a774"}) writev(r0, &(0x7f0000001380)=[{0x0}, {&(0x7f0000000380)="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", 0x788}], 0x2) 14:36:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000040)=""/199, 0xc7}], 0x1, 0xc0, 0x0) 14:36:34 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:34 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 14:36:34 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) 14:36:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f00000016c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:34 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 14:36:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc06", 0x88, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:34 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}}, &(0x7f0000000240)) 14:36:34 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0ae793d1bb52c4dd42174f455a296a26db9a95bcd68c1731989279037f78bfa035158ba0bccf77feea5e44647803736a0a83e97660cc78e6c985b221cee8e197", "a0aff228e4fc5c1b2a23bba7be1fc07f1cb8e8f99ea1dd7b4eb10bb9707b618ce9d0dd16c4452a074e3a33f0fb08f956286f08ed6ded4848705a13ad0cd45d7d", "252605bbae5378c2c2ca4b896a712e37b203d787fca60fee67a248b279d15fac"}) 14:36:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_tracing={0xf, 0x2, &(0x7f0000001400)=@raw=[@initr0], &(0x7f0000001480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:35 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000000), 0x10) 14:36:35 executing program 2: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x20481) 14:36:35 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 14:36:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc06", 0x88, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:35 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5452, &(0x7f0000000280)={0x6f, ""/111}) 14:36:35 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 217.903143][ T9235] loop4: detected capacity change from 0 to 224 [ 217.940674][ T9235] ISOFS: unable to read i-node block 56 [ 217.940718][ T9235] isofs_fill_super: get root inode failed [ 218.044627][ T9244] loop4: detected capacity change from 0 to 224 [ 218.067943][ T9244] ISOFS: unable to read i-node block 56 [ 218.067991][ T9244] isofs_fill_super: get root inode failed 14:36:35 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:35 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b8, 0x0, 0x2e0, 0xe8, 0x2e0, 0x0, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x6, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'vxcan1\x00', 'veth1_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@dev, @multicast2, 0x0, 0x0, 'veth0_virt_wifi\x00', 'wlan1\x00', {}, {}, 0x0, 0x5}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 14:36:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:35 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000280)={0x6f, ""/111}) 14:36:35 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1267, &(0x7f0000000280)={0x6f, ""/111}) [ 218.314971][ T9257] loop4: detected capacity change from 0 to 224 14:36:35 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:35 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:35 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f0000000080)=0x410002, 0x4) [ 218.390214][ T9257] ISOFS: unable to read i-node block 56 [ 218.407474][ T9257] isofs_fill_super: get root inode failed [ 218.467217][ T14] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc06", 0x88, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:35 executing program 2: syz_usb_connect(0x0, 0x35, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x78, 0x77, 0x25, 0x20, 0x19d2, 0x199, 0x4dc4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [@generic={0x8, 0xb, "83aec04d228b"}]}}]}}]}}]}}, 0x0) 14:36:35 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:35 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000180)={0xffffffff, 0x2, 0x0, "f66ab5c34302fe7b949b3c87cdeaa87a6f41c2a8a7913a3721a6cf0945b3f4bc"}) 14:36:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:35 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:35 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:35 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:35 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment], "a96f8e2ef783a449"}}}}}}}, 0x0) [ 218.599971][ T3673] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 218.613315][ T9293] loop4: detected capacity change from 0 to 224 14:36:35 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:35 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 218.677781][ T9293] ISOFS: unable to read i-node block 56 [ 218.703520][ T9293] isofs_fill_super: get root inode failed [ 218.717086][ T3673] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 218.744972][ T3749] hid-generic 0000:0000:0000.0004: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:35 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment], "a96f8e2ef783a449"}}}}}}}, 0x0) [ 218.798705][ T14] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 218.833258][ T9314] loop4: detected capacity change from 0 to 136 [ 218.856451][ T9314] isofs_fill_super: get root inode failed [ 219.038243][ T14] usb 3-1: Using ep0 maxpacket: 32 [ 219.158273][ T14] usb 3-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 219.328356][ T14] usb 3-1: New USB device found, idVendor=19d2, idProduct=0199, bcdDevice=4d.c4 [ 219.337485][ T14] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 219.349189][ T14] usb 3-1: Product: syz [ 219.353372][ T14] usb 3-1: Manufacturer: syz [ 219.357962][ T14] usb 3-1: SerialNumber: syz [ 219.366344][ T14] usb 3-1: config 0 descriptor?? [ 219.411621][ T14] option 3-1:0.0: GSM modem (1-port) converter detected [ 219.610602][ T3749] usb 3-1: USB disconnect, device number 9 [ 219.617410][ T3749] option 3-1:0.0: device disconnected 14:36:36 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000006c0)=@multiplanar_overlay={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "85914968"}, 0x0, 0x3, {0x0}}) 14:36:36 executing program 0: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment], "a96f8e2ef783a449"}}}}}}}, 0x0) 14:36:36 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:36 executing program 5: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) 14:36:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}]}}}}}}}, 0x0) 14:36:37 executing program 5: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) [ 220.163441][ T6] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 [ 220.166161][ T22] hid-generic 0000:0000:0000.0006: hidraw1: HID v0.00 Device [syz1] on syz1 [ 220.178591][ T9319] loop4: detected capacity change from 0 to 136 14:36:37 executing program 5: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) 14:36:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}]}}}}}}}, 0x0) 14:36:37 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x56a, 0x63, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000200)={0x0, 0x0, 0x16, &(0x7f0000000080)={0x5, 0xf, 0x16, 0x3, [@ptm_cap={0x3}, @ext_cap={0x7}, @ext_cap={0x7}]}}) 14:36:37 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:37 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:37 executing program 5: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {}]}}}}}}, 0x0) [ 220.275083][ T9319] isofs_fill_super: get root inode failed 14:36:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}]}}}}}}}, 0x0) 14:36:37 executing program 5: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {}]}}}}}}, 0x0) [ 220.379968][ T3707] hid-generic 0000:0000:0000.0008: hidraw1: HID v0.00 Device [syz1] on syz1 [ 220.395611][ T14] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:37 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) 14:36:37 executing program 0: syz_emit_ethernet(0x72, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3c, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2e"}}}}}}}, 0x0) 14:36:37 executing program 5: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {}]}}}}}}, 0x0) [ 220.452480][ T9350] loop4: detected capacity change from 0 to 136 [ 220.478701][ T9350] isofs_fill_super: get root inode failed [ 220.482890][ T14] hid-generic 0000:0000:0000.0009: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:37 executing program 0: syz_emit_ethernet(0x72, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3c, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2e"}}}}}}}, 0x0) 14:36:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 220.568263][ T6] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 220.601815][ T9364] loop4: detected capacity change from 0 to 224 [ 220.641666][ T9364] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 220.808172][ T6] usb 3-1: Using ep0 maxpacket: 32 [ 221.008293][ T6] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 221.178694][ T6] usb 3-1: New USB device found, idVendor=056a, idProduct=0063, bcdDevice= 0.40 [ 221.189335][ T6] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 221.197390][ T6] usb 3-1: Product: syz [ 221.201656][ T6] usb 3-1: Manufacturer: syz [ 221.206253][ T6] usb 3-1: SerialNumber: syz [ 221.250044][ T6] usbhid 3-1:1.0: couldn't find an input interrupt endpoint [ 221.451366][ T22] usb 3-1: USB disconnect, device number 10 14:36:38 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000a97000205d0500905ff1010203010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 14:36:38 executing program 5: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90b"}]}}}}}}, 0x0) 14:36:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:38 executing program 0: syz_emit_ethernet(0x72, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3c, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2e"}}}}}}}, 0x0) 14:36:38 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:38 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) 14:36:38 executing program 0: syz_emit_ethernet(0x74, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3e, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783"}}}}}}}, 0x0) 14:36:38 executing program 5: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90b"}]}}}}}}, 0x0) 14:36:38 executing program 0: syz_emit_ethernet(0x74, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3e, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783"}}}}}}}, 0x0) [ 221.983012][ T3707] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 221.994377][ T9374] loop4: detected capacity change from 0 to 224 [ 222.018750][ T3749] hid-generic 0000:0000:0000.000B: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:38 executing program 5: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90b"}]}}}}}}, 0x0) 14:36:38 executing program 0: syz_emit_ethernet(0x74, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3e, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783"}}}}}}}, 0x0) 14:36:38 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90bddee"}]}}}}}}, 0x0) [ 222.074698][ T9374] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 222.298184][ T3707] usb 3-1: new high-speed USB device number 11 using dummy_hcd [ 222.538191][ T3707] usb 3-1: Using ep0 maxpacket: 32 [ 222.818498][ T3707] usb 3-1: New USB device found, idVendor=055d, idProduct=9000, bcdDevice=f1.5f [ 222.833215][ T3707] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 222.841336][ T3707] usb 3-1: Product: syz [ 222.845510][ T3707] usb 3-1: Manufacturer: syz [ 222.850226][ T3707] usb 3-1: SerialNumber: syz [ 222.855946][ T3707] usb 3-1: config 0 descriptor?? [ 222.900846][ T3707] pwc: Samsung MPC-C10 USB webcam detected. [ 223.198327][ T3707] pwc: send_video_command error -71 [ 223.203575][ T3707] pwc: Failed to set video mode VGA@30 fps; return code = -71 [ 223.211194][ T3707] Philips webcam: probe of 3-1:0.0 failed with error -71 [ 223.219642][ T3707] usb 3-1: USB disconnect, device number 11 14:36:40 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000a97000205d0500905ff1010203010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 14:36:40 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90bddee"}]}}}}}}, 0x0) 14:36:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:40 executing program 0: syz_emit_ethernet(0x75, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3f, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a4"}}}}}}}, 0x0) 14:36:40 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:40 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) 14:36:40 executing program 0: syz_emit_ethernet(0x75, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3f, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a4"}}}}}}}, 0x0) 14:36:40 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90bddee"}]}}}}}}, 0x0) [ 223.681848][ T9401] loop4: detected capacity change from 0 to 224 [ 223.692136][ T3749] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 223.702059][ T22] hid-generic 0000:0000:0000.000D: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:40 executing program 0: syz_emit_ethernet(0x75, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x3f, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "3dd5e9", 0x0, 0x0, 0x0, @mcast2, @private1, [@fragment={0x32}], "a96f8e2ef783a4"}}}}}}}, 0x0) 14:36:40 executing program 5: syz_emit_ethernet(0x98, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x62, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 223.752145][ T9401] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:40 executing program 5: syz_emit_ethernet(0x98, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x62, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 223.857462][ T9417] loop4: detected capacity change from 0 to 224 [ 223.881924][ T9417] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 224.008409][ T3749] usb 3-1: new high-speed USB device number 12 using dummy_hcd [ 224.278170][ T3749] usb 3-1: Using ep0 maxpacket: 32 [ 224.568345][ T3749] usb 3-1: New USB device found, idVendor=055d, idProduct=9000, bcdDevice=f1.5f [ 224.577429][ T3749] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 224.585566][ T3749] usb 3-1: Product: syz [ 224.590035][ T3749] usb 3-1: Manufacturer: syz [ 224.594642][ T3749] usb 3-1: SerialNumber: syz [ 224.605057][ T3749] usb 3-1: config 0 descriptor?? [ 224.650710][ T3749] pwc: Samsung MPC-C10 USB webcam detected. [ 224.948290][ T3749] pwc: send_video_command error -71 [ 224.953533][ T3749] pwc: Failed to set video mode VGA@30 fps; return code = -71 [ 224.961179][ T3749] Philips webcam: probe of 3-1:0.0 failed with error -71 [ 224.971289][ T3749] usb 3-1: USB disconnect, device number 12 14:36:42 executing program 2: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x82540, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r0) sendmsg$IEEE802154_LLSEC_LIST_KEY(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) 14:36:42 executing program 0: syz_clone(0xa108000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:42 executing program 5: syz_emit_ethernet(0x98, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x62, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:42 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:42 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:42 executing program 5: syz_emit_ethernet(0x9a, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x64, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) 14:36:42 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4605, &(0x7f0000000140)) [ 225.443167][ T3707] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz1 [ 225.450177][ T9426] loop4: detected capacity change from 0 to 224 [ 225.453600][ T6] hid-generic 0000:0000:0000.000F: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:42 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x42000, 0x0) 14:36:42 executing program 0: r0 = semget(0x2, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000300)=""/230) 14:36:42 executing program 5: syz_emit_ethernet(0x9a, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x64, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:42 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='com.apple.FinderInfo\x00') 14:36:42 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x40, &(0x7f00000000c0)) [ 225.553429][ T9426] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:42 executing program 0: r0 = semget(0x2, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0xb, 0x0) 14:36:43 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:43 executing program 5: syz_emit_ethernet(0x9a, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x64, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:43 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:43 executing program 2: semget(0x2, 0x3, 0x80) 14:36:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002cc0), 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 14:36:43 executing program 5: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:43 executing program 2: r0 = semget(0x2, 0x0, 0x0) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000001200)=""/106) 14:36:43 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f0000000140)) [ 226.312674][ T9458] loop4: detected capacity change from 0 to 224 14:36:43 executing program 5: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:43 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001040)='.log\x00', 0x1e7061, 0x0) write$char_usb(r0, 0x0, 0x0) [ 226.358684][ T14] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz1 [ 226.398254][ T14] hid-generic 0000:0000:0000.0011: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:43 executing program 0: open$dir(&(0x7f0000000140)='./file1\x00', 0x44240, 0x81) [ 226.417374][ T9458] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 226.433639][ T26] audit: type=1800 audit(1652711803.258:2): pid=9475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1170 res=0 errno=0 14:36:44 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:44 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000001040)='.log\x00', 0x1e1060, 0x0) 14:36:44 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 14:36:44 executing program 5: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340), 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:44 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:44 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000500)='./file0\x00', 0x1) 14:36:44 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x22) 14:36:44 executing program 5: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 227.189137][ T9486] loop4: detected capacity change from 0 to 224 [ 227.198361][ T6] hid-generic 0000:0000:0000.0012: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:44 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x22) 14:36:44 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x40, 0x103) 14:36:44 executing program 5: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 227.274196][ T9486] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 227.283215][ T3749] hid-generic 0000:0000:0000.0013: hidraw1: HID v0.00 Device [syz1] on syz1 14:36:44 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:44 executing program 5: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:44 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x22) 14:36:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340), 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:44 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x28240, 0x40) 14:36:44 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:44 executing program 2: r0 = shmget(0x0, 0x7000, 0x0, &(0x7f0000ff8000/0x7000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x2000) 14:36:45 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f00000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:45 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x22) [ 228.134534][ T9511] loop4: detected capacity change from 0 to 224 [ 228.141435][ T3749] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:45 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000001040)='.log\x00', 0x1e7061, 0x0) [ 228.210335][ T3749] hid-generic 0000:0000:0000.0015: hidraw1: HID v0.00 Device [syz1] on syz1 [ 228.217343][ T9511] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:45 executing program 2: r0 = gettid() r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000180)) 14:36:45 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) 14:36:45 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:45 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f00000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340), 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:45 executing program 0: socketpair(0x11, 0xa, 0x80000001, 0x0) 14:36:45 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f00000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 228.346193][ T22] hid-generic 0000:0000:0000.0016: hidraw1: HID v0.00 Device [syz1] on syz1 [ 228.384191][ T9537] loop4: detected capacity change from 0 to 224 [ 228.438793][ T9537] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:45 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:45 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:45 executing program 2: r0 = socket(0xa, 0x3, 0x9) accept4$rose(r0, 0x0, 0x0, 0x0) 14:36:45 executing program 0: r0 = socket(0x22, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 14:36:45 executing program 5: syz_emit_ethernet(0x5c, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x26, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:45 executing program 2: openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) 14:36:45 executing program 5: syz_emit_ethernet(0x5c, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x26, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:45 executing program 0: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x47bc1c459e1c277b) [ 228.993506][ T9548] loop4: detected capacity change from 0 to 224 [ 229.021109][ T3749] hid-generic 0000:0000:0000.0017: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:45 executing program 5: syz_emit_ethernet(0x5c, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x26, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:45 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:45 executing program 0: setreuid(0xee01, 0xee00) socket$vsock_stream(0x28, 0x1, 0x0) 14:36:45 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000040)=0xf3, 0xfed9) [ 229.064071][ T9548] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 229.095261][ T3749] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:46 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000003600)={0x0, 0x0, &(0x7f00000035c0)={&(0x7f0000003640)=ANY=[@ANYBLOB], 0x1418}}, 0x0) 14:36:46 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x28, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:46 executing program 2: socketpair(0x25, 0x5, 0x5, 0x0) 14:36:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:46 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x28, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) 14:36:46 executing program 0: write$snapshot(0xffffffffffffffff, 0x0, 0x0) [ 229.875320][ T9576] loop4: detected capacity change from 0 to 224 14:36:46 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:46 executing program 2: syz_mount_image$ufs(0x0, 0x0, 0x0, 0x4, &(0x7f0000002040)=[{&(0x7f0000000c40)="ee", 0x1}, {&(0x7f0000000d40)="de", 0x1, 0x10001}, {&(0x7f0000000ec0)="e7", 0x1, 0xe47e}, {&(0x7f0000000f40)="5c6b0b4c87d8cb7185c5db77263934892fcc074de0af044bf97cbdd442daf6180ff14c9fc332ec77f2b5ceee679c3bd5630ef7e56869bf1404f8c03c32e0e4ac9c5e317d6a77449f75237fcf55f0a1c9504706767642ae7d3a3ffc7c272d9fede3ddef7bba72dbdb4771304382f2b51290bed6b878b6495b8cc17d204c18784623c9b49d866cdf7873de2b3d85231cd101518204ed8a12adadfb9465ce0b3e75579721d36f12604a5101a3fd063cf9cc7faf35605fe941b2ae0f7fef97ae059190", 0xc1}], 0x0, 0x0) 14:36:46 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000007880)) [ 229.926884][ T9576] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:46 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x28, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 229.993244][ T22] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on syz1 [ 230.023586][ T9594] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability 14:36:47 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:47 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x4c, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x4, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 14:36:47 executing program 0: socket(0xa, 0x3, 0x9) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 14:36:47 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:47 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x361000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 14:36:47 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x4c, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x4, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:47 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x4c, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x4, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 230.879255][ T9604] loop4: detected capacity change from 0 to 224 14:36:47 executing program 2: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000006c0), 0x90683, 0x0) 14:36:47 executing program 5: syz_emit_ethernet(0x94, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x5e, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x7, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 230.925370][ T9604] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:47 executing program 2: mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000000c00)) 14:36:48 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:48 executing program 5: syz_emit_ethernet(0x94, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x5e, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x7, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:48 executing program 2: syz_open_dev$evdev(&(0x7f0000000000), 0xffffffffffffffff, 0x181040) 14:36:48 executing program 0: syz_clone(0xb00000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:48 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:36:48 executing program 5: syz_emit_ethernet(0x94, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x5e, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x7, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:48 executing program 2: r0 = socket(0xa, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'gretap0\x00', 0x0}) 14:36:48 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:36:48 executing program 0: syz_clone(0xb00000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 231.771364][ T9631] loop4: detected capacity change from 0 to 224 14:36:48 executing program 5: syz_emit_ethernet(0x9d, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x67, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x8, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000d40)) [ 231.841769][ T9631] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:49 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:49 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:36:49 executing program 0: syz_clone(0xb00000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:49 executing program 2: syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="14") 14:36:49 executing program 5: syz_emit_ethernet(0x9d, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x67, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x8, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:49 executing program 5: syz_emit_ethernet(0x9d, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x67, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x8, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:49 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 232.652960][ T9661] loop4: detected capacity change from 0 to 224 14:36:49 executing program 0: syz_clone(0xb00000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:49 executing program 5: syz_emit_ethernet(0xa2, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6c, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x8, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 232.705926][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.715138][ T9661] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 232.719737][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.732190][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 14:36:49 executing program 5: syz_emit_ethernet(0xa2, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6c, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x8, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 232.749850][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.762751][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.772785][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.788906][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 14:36:49 executing program 0: r0 = socket(0xa, 0x3, 0x9) bind$rose(r0, &(0x7f0000000400)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast, @null]}, 0x40) [ 232.811490][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.845514][ T3749] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 232.872394][ T3749] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:50 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:50 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x11, &(0x7f00000000c0)="6edbc5644a58e1bfebce979ffcd0cd0622"}) 14:36:50 executing program 5: syz_emit_ethernet(0xa2, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6c, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x8, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000740)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000007c0)=ANY=[], 0xf0}}], 0x1, 0x0) 14:36:50 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 5: syz_emit_ethernet(0xa4, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6e, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a8"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:50 executing program 2: r0 = timerfd_create(0x8, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) 14:36:50 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 233.533326][ T9690] loop4: detected capacity change from 0 to 224 [ 233.542852][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.561355][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 14:36:50 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @empty, @local}, 0xc) 14:36:50 executing program 5: syz_emit_ethernet(0xa4, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6e, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a8"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:50 executing program 0: r0 = socket(0xa, 0x3, 0x9) connect$rose(r0, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) [ 233.599206][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.628954][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.662569][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.676139][ T9690] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 233.702495][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.720626][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.732848][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 233.740697][ T3707] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 14:36:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:50 executing program 5: syz_emit_ethernet(0xa4, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6e, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a8"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:50 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0, 0x54}}, 0x0) 14:36:50 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000180)=[{0x3e}]}) 14:36:50 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a818"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 233.767144][ T3707] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:50 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000040), 0x0, 0x2) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000080)) 14:36:50 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000440)) [ 233.848799][ T9719] loop4: detected capacity change from 0 to 224 14:36:50 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a818"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:50 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002300), 0x2, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000004380)={0x20}, 0x20) [ 233.901720][ T9719] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 233.904178][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 233.935319][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 233.959866][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 233.982821][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 233.994072][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 234.002039][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 14:36:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0xcf2c, 0xffffad72]) 14:36:50 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a818"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:36:50 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000180)) [ 234.010865][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 234.051624][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 234.070874][ T9743] loop4: detected capacity change from 0 to 224 [ 234.081743][ T3749] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 14:36:50 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="400000002c000100"/20, @ANYRES32, @ANYBLOB="000000000000f3ff000003000700010066faff"], 0x40}}, 0x0) 14:36:50 executing program 5: socket(0xa, 0x3, 0x9) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000480)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xfb9c}, 0x0, 0x0, 0x0) 14:36:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) [ 234.104269][ T9743] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 234.116925][ T3749] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 234.184534][ T9748] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 234.219048][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.233192][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.263555][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.272461][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.280551][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.291667][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.301970][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.309506][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.316907][ T3707] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 234.330193][ T3707] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:51 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000280)="88", 0x1, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) 14:36:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x200, 0x4) 14:36:51 executing program 0: syz_mount_image$hpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 14:36:51 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:51 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000023c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000002400)={0x0, 0x1, 'D'}) 14:36:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x10, 0xa, 0x801}, 0x14}}, 0x0) 14:36:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0x180, 0x180, 0xffffffff, 0xffffffff, 0x250, 0x250, 0x250, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e31fffdc64b4fedc7c123cb945845ab00c46753af20c288bd1bee998756c"}}}, {{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'virt_wifi0\x00', 'syz_tun\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) [ 234.733679][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.737662][ T9764] loop4: detected capacity change from 0 to 224 [ 234.761108][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 14:36:51 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) [ 234.791498][ T9764] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 234.802071][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.810340][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.821579][ T9773] x_tables: duplicate underflow at hook 2 [ 234.827604][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 14:36:51 executing program 0: recvmsg$kcm(0xffffffffffffffff, 0x0, 0xe0847340d1d8ac52) 14:36:51 executing program 5: syz_clone(0x804a0100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 234.836613][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.851721][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.865364][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.878029][ T3707] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 234.897700][ T3707] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:52 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0), 0x6, 0x43) 14:36:52 executing program 2: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/249) 14:36:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@RTM_GETMDB={0x18}, 0x18}}, 0x0) 14:36:52 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:52 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={&(0x7f0000002b00)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 14:36:52 executing program 5: socketpair(0x3, 0x0, 0xab8a, 0x0) 14:36:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local}}) [ 235.653894][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.665335][ T9792] loop4: detected capacity change from 0 to 224 [ 235.668593][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.684342][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.692438][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 14:36:52 executing program 0: request_key(&(0x7f0000000180)='.request_key_auth\x00', 0x0, 0x0, 0x0) [ 235.700899][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.708575][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.732590][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.743255][ T9792] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000001c0)) 14:36:52 executing program 2: r0 = socket(0x22, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:36:52 executing program 0: r0 = socket(0xa, 0x3, 0x9) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) [ 235.761127][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 235.786710][ T3749] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 14:36:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, &(0x7f0000000300)) [ 235.822302][ T3749] hid-generic 0000:0000:0000.001F: hidraw0: HID v0.00 Device [syz1] on syz1 [ 235.877881][ T9812] loop4: detected capacity change from 0 to 224 [ 235.936244][ T9812] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:53 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:53 executing program 2: ioprio_set$uid(0x0, 0x0, 0x0) 14:36:53 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:53 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) 14:36:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x1, 0x9, 0x8de54de95a480c99, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 14:36:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:53 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:36:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x5, 0x200}, 0xc) 14:36:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[], 0x14}}, 0x0) [ 236.548511][ T9824] loop4: detected capacity change from 0 to 224 [ 236.582048][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 14:36:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f00000000c0)=""/64) 14:36:53 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 236.607088][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.622112][ T9824] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 236.634193][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.669224][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.684939][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.701328][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.714621][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.723246][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.738400][ T1127] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 236.747860][ T1127] hid-generic 0000:0000:0000.0020: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:53 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, 0x0) 14:36:53 executing program 2: openat$sw_sync_info(0xffffffffffffff9c, 0x0, 0x501942, 0x0) 14:36:53 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:53 executing program 5: r0 = socket(0xa, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000480)=@newtfilter={0x40, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xfff3}, {0x0, 0x3}}, [@filter_kind_options=@f_fw={{0x7}, {0x4}}, @TCA_RATE={0x6}, @TCA_CHAIN={0x8}]}, 0x40}}, 0x0) [ 236.766974][ T3707] Bluetooth: hci0: command 0x0406 tx timeout 14:36:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/145) 14:36:53 executing program 0: socketpair(0x2c, 0x0, 0x0, 0x0) [ 236.790260][ T9848] loop4: detected capacity change from 0 to 224 [ 236.791941][ T3707] Bluetooth: hci1: command 0x0406 tx timeout [ 236.816952][ T3707] Bluetooth: hci2: command 0x0406 tx timeout 14:36:53 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000000c0)) 14:36:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x4b0, 0xffffffff, 0x310, 0x310, 0x218, 0xffffffff, 0xffffffff, 0x3e0, 0x3e0, 0x3e0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@unspec=@mark={{0x30}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'wlan1\x00'}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@addrtype1={{0x28}}]}, @REJECT={0x28}}, {{@ipv6={@empty, @private2, [], [], '\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) [ 236.837978][ T3707] Bluetooth: hci5: command 0x0406 tx timeout [ 236.852921][ T3707] Bluetooth: hci3: command 0x0406 tx timeout [ 236.854577][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 236.867717][ T3707] Bluetooth: hci4: command 0x0406 tx timeout [ 236.877413][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 14:36:53 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 236.894536][ T9848] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 236.913664][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 236.921154][ T9863] x_tables: duplicate underflow at hook 2 [ 236.937194][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 14:36:53 executing program 5: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000040)=""/20) [ 236.945954][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 236.963348][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 236.977411][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 236.985117][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 14:36:53 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_delvlan={0x18}, 0x18}}, 0x0) 14:36:53 executing program 0: pselect6(0x40, &(0x7f0000000000)={0x2}, &(0x7f0000000040)={0x5}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) [ 236.995542][ T22] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 237.025702][ T22] hid-generic 0000:0000:0000.0021: hidraw0: HID v0.00 Device [syz1] on syz1 [ 237.093231][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.106628][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.114248][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.121837][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.129291][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.136679][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.144202][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.151710][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.159172][ T22] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 237.173015][ T22] hid-generic 0000:0000:0000.0022: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:54 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0xff}, 0x8) 14:36:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) 14:36:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000002380)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002340)={&(0x7f0000002600)={0x48, 0x13, 0xa, 0x707, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFTA_OBJ_TYPE={0x0, 0x3, 0x1, 0x0, 0x3}, @NFTA_OBJ_TYPE={0xa8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_OBJ_TABLE={0x0, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x0, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20044000}, 0x48810) r1 = socket(0x11, 0x0, 0x7fff80) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000280), 0x7c1001, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) r3 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000002140)={0x10, 0x0, 0x0, 0x60002000}, 0xc, &(0x7f0000002200)={&(0x7f0000002180)={0x44, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@base={0xd, 0x101, 0xffff, 0x0, 0x12, r3, 0x9, '\x00', 0x0, r3, 0x5, 0x1, 0x5}, 0x48) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000020c0)={0x0, 0x2, r4, 0x1b3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000000)={0x0, 0x0, "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", "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"}) semget$private(0x0, 0x4, 0x24) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001000)={0x0, r5, "5aa9621a5233671c6c26a09138807e59a15f4d65e525f0b71c75199478ae23204b4894f0685b2cf925a4383890f712f033c010a6e5c1117995d9628bd18669cf835b7ae56076bb6182f77f022fd1709b54dbd227d91ad67738116830d0db1d30b9f2cd62dfb92947638e8909c94f8b79a4a553cadb2c6ccc1ce37222233601059b93218473bcd17462fc778d2422f26995d041bb9c6eb91cca15c61d3ae88f8f9b250ab031175ad775f07072bfc18206d227e439ade9bebf88d275b54fc247ab8248430d7f0f03991ae93d7f26847b38fb9e53bb2551e62517ff025901eeb2aa51a4afebca5e9eba8b6f763c46ba80adc254b1dafa072301e583a5f4b555dbe5", "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"}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000025c0)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002580)={&(0x7f0000002540)={0x14, 0x1, 0x3, 0x201, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x40080}, 0x20004004) sendmsg$nl_netfilter(r6, &(0x7f0000003600)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x63200004}, 0xc, &(0x7f00000035c0)={&(0x7f0000003640)=ANY=[@ANYBLOB="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"], 0x1418}, 0x1, 0x0, 0x0, 0x4804}, 0x20000000) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000002400), 0x141000, 0x0) 14:36:54 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:54 executing program 2: r0 = socket(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x390, 0xffffffff, 0x0, 0x0, 0x120, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, 0x0, {[{{@ip={@rand_addr, @private, 0x0, 0x0, 'veth1_vlan\x00', 'ip6erspan0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "d3ba"}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@addrtype={{0x30}}, @common=@inet=@esp={{0x30}}]}, @common=@unspec=@CLASSIFY={0x28}}, {{@ip={@dev, @loopback, 0x0, 0x0, 'team_slave_1\x00', 'wg2\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 14:36:54 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 237.645894][ T9885] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. [ 237.657785][ T9887] sctp: [Deprecated]: syz-executor.5 (pid 9887) Use of struct sctp_assoc_value in delayed_ack socket option. [ 237.657785][ T9887] Use struct sctp_sack_info instead [ 237.674661][ T9882] loop4: detected capacity change from 0 to 224 14:36:54 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:36:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000900)={&(0x7f00000007c0), 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="978558990914"}, @BATADV_ATTR_GW_BANDWIDTH_UP, @BATADV_ATTR_NETWORK_CODING_ENABLED, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0xffffffd2}}, 0x0) 14:36:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:54 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 237.745196][ T9882] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 [ 237.745692][ T9894] x_tables: duplicate underflow at hook 2 [ 237.853399][ T9904] loop4: detected capacity change from 0 to 224 [ 237.880249][ T9904] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:55 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x3}, 0x14}}, 0x0) 14:36:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, r1, 0x601}, 0x14}}, 0x0) 14:36:55 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup=r0, 0xffffffffffffffff, 0x5}, 0x10) 14:36:55 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xe8, 0x1b0, 0x0, 0xffffffff, 0xffffffff, 0x2c0, 0x2c0, 0x2c0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00'}}]}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'macvtap0\x00', 'hsr0\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@ah={{0x30}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "ac28"}}, @common=@osf={{0x50}, {'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 14:36:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) 14:36:55 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) [ 238.551432][ T9911] loop4: detected capacity change from 0 to 224 14:36:55 executing program 0: syz_clone3(&(0x7f0000007080)={0x12000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000007040)=[0x0], 0x1}, 0x58) 14:36:55 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x8) 14:36:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000080), &(0x7f0000000040)=0xffffffffffffff45) [ 238.628763][ T9911] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:56 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:56 executing program 5: sysfs$2(0x2, 0x3, &(0x7f00000000c0)=""/4096) 14:36:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) 14:36:56 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x29, 0xf, &(0x7f0000000240)) 14:36:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:56 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@pci={{0x8}, {0x11}}]}, 0x30}}, 0x0) 14:36:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 14:36:56 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 239.450638][ T9938] loop4: detected capacity change from 0 to 224 14:36:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000014"], 0x48}}], 0x1, 0x0) 14:36:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x19, 0xa, 0x401}, 0x14}}, 0x0) [ 239.513677][ T9938] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000100)={0x20, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x20}}, 0x0) [ 239.601034][ T9956] nbd: must specify a device to reconfigure 14:36:57 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:57 executing program 0: syz_clone3(&(0x7f0000002f40)={0x22001000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:36:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:57 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RGETLOCK(r0, 0x0, 0x0) 14:36:57 executing program 2: r0 = epoll_create(0x2) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 14:36:57 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:57 executing program 5: r0 = getpgrp(0xffffffffffffffff) tgkill(r0, r0, 0x41) [ 240.358415][ T9964] loop4: detected capacity change from 0 to 224 14:36:57 executing program 0: bpf$BPF_PROG_ATTACH(0x1e, &(0x7f00000002c0), 0x14) 14:36:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004bf0008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fb0f4655fe21e1fe4317b88602d9aeef465", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000e40)=ANY=[]) r2 = socket$packet(0x11, 0x3, 0x300) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) dup2(r2, r1) umount2(&(0x7f0000000380)='./file0\x00', 0x0) 14:36:57 executing program 5: openat$loop_ctrl(0xffffff9c, &(0x7f00000004c0), 0x44002, 0x0) [ 240.405192][ T9964] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001180)={0x1, &(0x7f0000001140)=[{0x25}]}) 14:36:57 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa281462cee556029, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:58 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x34}}, 0x0) 14:36:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:58 executing program 2: syz_io_uring_setup(0x2518, &(0x7f00000001c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 14:36:58 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f00000000c0)=@framed={{}, [@exit, @func]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:58 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:58 executing program 5: bpf$BPF_PROG_ATTACH(0x4, 0x0, 0x0) 14:36:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername$netlink(r0, 0x0, &(0x7f0000000040)=0xc) 14:36:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) [ 241.223028][ T9989] loop4: detected capacity change from 0 to 224 14:36:58 executing program 2: openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/vmcoreinfo', 0x4000, 0x0) 14:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "c5"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x44}}, 0x0) 14:36:58 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) [ 241.296923][ T9989] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:58 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x8, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:58 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) 14:36:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 14:36:58 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:58 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) 14:36:58 executing program 2: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) 14:36:58 executing program 0: pipe(&(0x7f0000000a80)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x7, &(0x7f0000000240)=@framed={{}, [@map_idx_val, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000280)='GPL\x00', 0x1, 0xfb, &(0x7f0000000340)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440), 0x10}, 0x80) [ 242.108018][T10019] loop4: detected capacity change from 0 to 224 14:36:59 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) 14:36:59 executing program 5: read$watch_queue(0xffffffffffffffff, &(0x7f0000000380)=""/171, 0xab) 14:36:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x18, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_DEBUG_HEADER={0x4}]}, 0x18}}, 0x0) [ 242.187185][T10019] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:59 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xe, 0x12, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:36:59 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, 0x0, 0x0}, 0x1c) 14:36:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:59 executing program 5: read$watch_queue(0xffffffffffffffff, &(0x7f0000000380)=""/171, 0xab) 14:36:59 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:36:59 executing program 2: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/module/fuse', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r0) 14:36:59 executing program 5: read$watch_queue(0xffffffffffffffff, &(0x7f0000000380)=""/171, 0xab) 14:36:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x18, r1, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_DEBUG_MSGMASK={0x4}]}, 0x18}}, 0x0) [ 243.025064][T10044] loop4: detected capacity change from 0 to 224 14:36:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:36:59 executing program 5: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) [ 243.077343][T10044] isofs_fill_super: bread failed, dev=loop4, iso_blknum=56, block=112 14:36:59 executing program 5: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) [ 243.121851][T10057] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 243.170949][T10062] loop4: detected capacity change from 0 to 224 14:37:00 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:00 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x3f, &(0x7f0000002080)={0x0, 0x0, 0x4}) 14:37:00 executing program 0: bpf$PROG_LOAD_XDP(0x12, 0x0, 0x0) 14:37:00 executing program 5: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) 14:37:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:00 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:00 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xb1, &(0x7f00000000c0)=""/177, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:00 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(0xffffffffffffffff, &(0x7f0000000380)=""/171, 0xab) 14:37:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17}, 0x48) [ 243.900719][T10067] loop4: detected capacity change from 0 to 224 14:37:00 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(0xffffffffffffffff, &(0x7f0000000380)=""/171, 0xab) 14:37:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:00 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af20, &(0x7f0000000000)={0x0, r1}) [ 244.030988][T10088] loop4: detected capacity change from 0 to 224 14:37:01 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@jmp, @func]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:01 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(0xffffffffffffffff, &(0x7f0000000380)=""/171, 0xab) 14:37:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:01 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af20, &(0x7f0000000000)={0x0, r1}) 14:37:01 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:01 executing program 0: socketpair(0x2, 0xa, 0x5, &(0x7f0000000000)) 14:37:01 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) [ 244.787578][T10097] loop4: detected capacity change from 0 to 224 14:37:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x12, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) 14:37:01 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x4206, r0, 0x0, 0x0) 14:37:01 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) 14:37:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 244.937397][T10118] loop4: detected capacity change from 0 to 224 14:37:02 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 14:37:02 executing program 2: r0 = getpgid(0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0xfffffbff}) 14:37:02 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) 14:37:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:02 executing program 0: r0 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 14:37:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x81f}]}) 14:37:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xaf, &(0x7f0000000180)=""/175, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 245.659106][T10122] loop4: detected capacity change from 0 to 224 14:37:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:02 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x1, &(0x7f0000000100)=@raw=[@call], &(0x7f0000000140)='syzkaller\x00', 0x9, 0xea, &(0x7f0000000180)=""/234, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f0000000200)=@generic={0x0, "0acdedef4b796444d635fdaaab663768d6e87e839ac6b17ac77aba42cd07567137db905762599943fca253ac0c1d0445428e3ac537bb813660f4552a2388c1c57fa9d89b6932dc93ebbd77bb29bfcdafaadf849b45a32e73709178ecc6cd72df85dc7304a2d812fe9cbe2132e6f76ec7bd4246d636e78fbbca388b4b8660"}, 0x9000000) [ 245.736111][ T26] audit: type=1326 audit(1652711822.558:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10131 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9fd1c890e9 code=0x0 [ 245.812789][T10145] loop4: detected capacity change from 0 to 224 14:37:03 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 14:37:03 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) 14:37:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f0000000200)=@generic={0x10, "0acdedef4b796444d635fdaaab663768d6e87e839ac6b17ac77aba42cd07567137db905762599943fca253ac0c1d0445428e3ac537bb813660f4552a2388c1c57fa9d89b6932dc93ebbd77bb29bfcdafaadf849b45a32e73709178ecc6cd72df85dc7304a2d812fe9cbe2132e6f76ec7bd4246d636e78fbbca388b4b8660"}, 0x80) 14:37:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:03 executing program 2: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x80000000}, &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={[0x6]}, 0x8}) 14:37:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x7}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x38}}, 0x0) 14:37:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:37:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 246.594402][T10155] loop4: detected capacity change from 0 to 224 14:37:03 executing program 2: syz_open_dev$loop(&(0x7f0000000100), 0xfbfff7fc, 0x0) 14:37:03 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000340)='/proc/consoles\x00', 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000380)=""/171, 0xab) [ 246.662359][T10162] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 246.711528][T10168] loop4: detected capacity change from 0 to 224 14:37:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3}]}) 14:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f00000000c0)=@unspec, 0xfffffffffffffe45) 14:37:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000002c0)={'ip6tnl0\x00', 0x0}) 14:37:04 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:04 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 14:37:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001180)={0x1, &(0x7f0000001140)=[{0x45}]}) [ 247.462242][T10178] loop4: detected capacity change from 0 to 224 14:37:04 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x27c, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x204, 0xffffffff, 0xffffffff, 0x204, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @local, [], [], 'xfrm0\x00', 'gretap0\x00'}, 0x0, 0xa4, 0xc8}, @common=@unspec=@STANDARD={0x24, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@private1, @loopback, [], [], 'vlan1\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa4, 0xec}, @unspec=@CT0={0x48}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d8) 14:37:04 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80), 0x0, 0x0, 0x0) [ 247.525470][T10178] ISOFS: Logical zone size(0) < hardware blocksize(1024) 14:37:04 executing program 5: syz_mount_image$fuse(&(0x7f0000002200), &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)) 14:37:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:04 executing program 2: socketpair(0x10, 0x3, 0x7, &(0x7f0000000000)) 14:37:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 14:37:04 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80), 0x0, 0x0, 0x0) [ 247.630147][ T14] hid-generic 0000:0000:0000.0023: hidraw0: HID v0.00 Device [syz1] on syz1 [ 247.681208][T10202] loop4: detected capacity change from 0 to 224 [ 247.728630][T10202] ISOFS: Logical zone size(0) < hardware blocksize(1024) 14:37:05 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:05 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 14:37:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80), 0x0, 0x0, 0x0) 14:37:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xf, 0x0, 0x28) 14:37:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x1ac65d, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x10, &(0x7f0000000140), 0x8) 14:37:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80), 0x0, 0x0, 0x0) 14:37:05 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x3}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 248.370640][T10217] loop4: detected capacity change from 0 to 224 [ 248.405545][T10217] ISOFS: Logical zone size(0) < hardware blocksize(1024) 14:37:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000004640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 248.463379][ T1127] hid-generic 0000:0000:0000.0024: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 0: sched_getparam(0x0, &(0x7f0000000380)) 14:37:06 executing program 2: getitimer(0x7baaf9bf733aa2aa, &(0x7f0000000080)) 14:37:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, 0x0, 0x28) 14:37:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5451, 0x0) 14:37:06 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x133400) 14:37:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@getaddr={0x14, 0x16, 0xcd708e70d7d005c1}, 0x14}}, 0x0) [ 249.289024][ T3707] hid-generic 0000:0000:0000.0025: hidraw0: HID v0.00 Device [syz1] on syz1 [ 249.289164][T10246] loop4: detected capacity change from 0 to 224 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002240)={0x6, 0xd, &(0x7f0000000080)=@framed={{}, [@map_val, @map_fd, @generic, @jmp, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe}, @ldst={0x0, 0x2, 0x0, 0x8, 0x8, 0x80, 0xfffffffffffffff0}, @generic={0xdf, 0x0, 0x8, 0x9, 0x8c}]}, &(0x7f0000000100)='syzkaller\x00', 0xd710, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000021c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000002200)={0x3, 0x6, 0xffff, 0x9a}, 0x10}, 0x80) 14:37:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@map_idx_val]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xad, &(0x7f00000001c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 249.339969][ T14] hid-generic 0000:0000:0000.0026: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, 0x0, 0x0) [ 249.402754][T10246] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 249.432269][ T14] hid-generic 0000:0000:0000.0027: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000f3ffffff840000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 249.480034][ T3749] hid-generic 0000:0000:0000.0028: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, 0x0, 0x28) 14:37:06 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 14:37:06 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x4b, &(0x7f0000000140), 0x8) 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 249.558627][ T3673] hid-generic 0000:0000:0000.0029: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="4812000032006f"], 0x1248}}, 0x0) 14:37:06 executing program 2: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl0\x00', 0x0}) 14:37:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x19, &(0x7f0000000140), 0x8) [ 249.620274][ T14] hid-generic 0000:0000:0000.002A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 249.639778][T10278] loop4: detected capacity change from 0 to 224 14:37:06 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 249.687389][ T14] hid-generic 0000:0000:0000.002B: hidraw0: HID v0.00 Device [syz1] on syz1 [ 249.708879][T10278] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 249.727541][T10288] netlink: 4660 bytes leftover after parsing attributes in process `syz-executor.5'. 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) [ 249.765214][ T3673] hid-generic 0000:0000:0000.002C: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000004240), 0x0, 0x101) write$FUSE_GETXATTR(r0, &(0x7f0000008480)={0x18}, 0x18) 14:37:06 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={[0x1]}, 0x8}) [ 249.830633][ T3673] hid-generic 0000:0000:0000.002D: hidraw0: HID v0.00 Device [syz1] on syz1 [ 249.847979][T10298] loop4: detected capacity change from 0 to 224 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {0x0}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x2, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:06 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)) [ 249.922876][T10298] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 249.935196][ T3673] hid-generic 0000:0000:0000.002E: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2d, 0x0, 0x0) 14:37:06 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') 14:37:06 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x537}, 0x14}}, 0x0) [ 250.002041][ T3707] hid-generic 0000:0000:0000.002F: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:06 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {0x0}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="481200005e006f"], 0x1248}}, 0x0) 14:37:06 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') 14:37:07 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {0x0}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 250.096315][ T3673] hid-generic 0000:0000:0000.0030: hidraw0: HID v0.00 Device [syz1] on syz1 [ 250.114625][ T3707] hid-generic 0000:0000:0000.0031: hidraw1: HID v0.00 Device [syz1] on syz1 [ 250.118641][T10316] loop4: detected capacity change from 0 to 224 14:37:07 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@isdn, 0x80) 14:37:07 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 250.196238][ T3673] hid-generic 0000:0000:0000.0032: hidraw0: HID v0.00 Device [syz1] on syz1 [ 250.233157][T10316] isofs_fill_super: get root inode failed 14:37:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:07 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') 14:37:07 executing program 2: r0 = socket(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8993, &(0x7f0000000480)={'batadv_slave_1\x00'}) [ 250.263022][ T3673] hid-generic 0000:0000:0000.0033: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:07 executing program 5: r0 = socket(0x2, 0xa, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f00000003c0)={0x0, 0x1, @start={0x0, 0x0, "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", "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"}, [0x800, 0x0, 0x0, 0x3, 0x3, 0x9, 0x5, 0x10001, 0x3, 0x9, 0x3, 0x2b, 0x3, 0x1, 0x1, 0x0, 0xfff, 0x8000000000000001, 0x400, 0x89a, 0xfffffffffffffff9, 0x5, 0x8, 0x7, 0x10001, 0x8000000000000001, 0x3ff, 0x2, 0x7, 0x1, 0xffffffffffff7fff, 0x1, 0x400, 0xeac3, 0x793f, 0x8000000000000000, 0x4, 0xfce7c2d, 0x2, 0x10000, 0xfffffffffffffffe, 0xa5, 0x1, 0xffffffffffffffff, 0xd62f, 0x200, 0x2, 0x4, 0x2, 0x0, 0x69, 0x2, 0x8, 0x7f, 0x4, 0x4, 0x1, 0x21, 0x9, 0x401, 0x498dcc92, 0x4, 0x1000, 0x5]}) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', r2, 0x2f, 0x9, 0xf8, 0x40c9, 0x4, @private0, @loopback, 0x8000, 0x10, 0x1, 0xffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', r2, 0x2f, 0x1, 0x6, 0x5, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x42}}, 0x20, 0x10, 0x1f, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000240)={'sit0\x00', r2, 0x2d, 0x0, 0x4, 0x0, 0x20, @rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x1, 0x1, 0x9, 0x3}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000e00)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000002340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002300)={&(0x7f0000000e40)={0x14bc, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xd8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa, 0x4, "866b2279b0ff"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_VALUE={0x28, 0x4, "ef47e05c8e6050763a69e793722e840b562427acf947e202a91dd57341a028d95e4223ca"}, @ETHTOOL_A_BITSET_VALUE={0x89, 0x4, "fe147834f0d181a852e59849a257c1c7b57c71fd121959084079085ae15fdb34fcee5360e0d7037dc12a0515314eca730c87b3ff255737f5b2687f8d3669e44b4ed2bd32bc6c61583d5fd43cae9c0359ae79005a36fa2659fd6ee9bf60227b4ef1d4fe00ccec99ad9d77a586dc5f7078fe47e724209e8846be7ff62370bda226091dd6d4a2"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x27, 0x5, "a37d3c36f8dbb57e18b91de023badf5cfae0b7e53352b2b11b07750a7a6c4811e23dda"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1014, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x57, 0x4, "1c92e43c6b8b9bff98a962ac7bff65568745fc98e046b87d85e6339d62483a210d56762e05d7875b1e4b8e6ef09b1e85c06ca6cc2f7f2fb84e82f0468e9bc9a0740c01628ed4d4aedfcba07b399c45e241f4c6"}, @ETHTOOL_A_BITSET_MASK={0xb, 0x5, "211dfc93fd01a3"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "6236a211a61fda909b52ece3"}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'vxcan0\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'vxcan0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_VALUE={0x42, 0x4, "47753af41389f6c898db1a15d7eaf0880549580736855a4c46b051b39e1185808087399b56dd1d0365ef1e5062f41ee9ce9be1dee02c25e2ee499ec78e0f"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xa8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x9e, 0x4, "fea9267cd1ec7377f136707d8b69f11d565fa69f469afba547be21e4e92b4d439cef7f7f25e6ebc26a1b635db8c843ed604437c564d4133500463b017b783f3dedbda5e4d56c51e407ede1da7e5a6cf513676d9c630ce10c643674098720c45ad628f3ca52ec9f550bf1c452d95ad8a9f6e750ef020726617f11784d372961c0ba6bea2c2f69bce8fe1b0b742334fecdf1e3e892ecfda2b7c4b1"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xaa, 0x5, "d278feac98ccc30a1a82a56845a4feddf8492a3ae9660b66600f5445b6070b44e743f8d3116eb49917b16c5a5a91bc78c146e77ecb3c021004b78d5ba7632a56cb15cd6f93ec6ce82bd6d5cb7049817ad93f6ea2465c709014e3840715e021cd450e57fc9c7c113cb9170d0913f7b4951568781a889f8f01801fd13ab7d436a5316ad8bbdca2365667630bfd0fcec52c106b91ee490a51c7b2720c403342d30cf5eccb5bd0d1"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0x14bc}, 0x1, 0x0, 0x0, 0x20008001}, 0x4048084) 14:37:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2e, 0x0, 0x0) [ 250.304930][ T3749] hid-generic 0000:0000:0000.0034: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/70, 0x46}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') 14:37:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="4812000066006f"], 0x1248}}, 0x0) [ 250.384597][T10343] loop4: detected capacity change from 0 to 224 [ 250.416684][ T3749] hid-generic 0000:0000:0000.0035: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:07 executing program 5: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 14:37:07 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd, 0x0, 0x0) 14:37:07 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {0x0}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 250.429098][ T3707] hid-generic 0000:0000:0000.0036: hidraw1: HID v0.00 Device [syz1] on syz1 [ 250.450041][T10343] isofs_fill_super: get root inode failed [ 250.462488][T10355] netlink: 4644 bytes leftover after parsing attributes in process `syz-executor.2'. 14:37:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/70, 0x46}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002b40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)) [ 250.557229][ T3749] hid-generic 0000:0000:0000.0037: hidraw0: HID v0.00 Device [syz1] on syz1 [ 250.589161][T10366] loop4: detected capacity change from 0 to 224 14:37:07 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {0x0}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x78, 0x77, 0x25, 0x20, 0x19d2, 0x199, 0x4dc4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{}]}}]}}]}}, 0x0) syz_usb_ep_read(r0, 0x0, 0x0, 0x0) 14:37:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/70, 0x46}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 0: io_uring_setup(0x0, &(0x7f0000000200)) 14:37:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000240)) [ 250.603321][ T3707] hid-generic 0000:0000:0000.0038: hidraw0: HID v0.00 Device [syz1] on syz1 [ 250.620585][T10368] fuse: Bad value for 'fd' [ 250.637509][T10366] isofs_fill_super: get root inode failed 14:37:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:07 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002b40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 250.692253][ T3749] hid-generic 0000:0000:0000.0039: hidraw0: HID v0.00 Device [syz1] on syz1 [ 250.710127][ T3707] hid-generic 0000:0000:0000.003A: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:07 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {0x0}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:07 executing program 2: r0 = syz_clone(0x80250000, &(0x7f0000000140)="13cb9da136a6844645cbfc144d39679eed55a52eead66687c28815190b3ac3faa2a2143f4d4de6e89e01525ee3919fca433edff4305246c40dc4a28114973a30a55524291a22ed76350cdd9caab554c369a4654b1bcd7a5606c10de552436822060689bc26910469bf8f14b3722c28bb7bfd9c5c0e869c0f8fe59be87bf0ee1e8d97c21913393b9c9cdc9582b76d3245c85f952d61fcc92786eb26330afe718d224a8ff3d8306351910555cd9da9f2", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="aeac2b33045f0228b54350656939f5cf732fa97d05ebe537501838c98edba1b08d0a771ece72c2faa718c55b18148fded2a2dfcf55a9e7df5314b305fb6e605d63c4196bc5e172af89a1637181db9227e869c519c84cb3c9bff394282833f3d5131859f7620404f59af56ebd451228ebaef07560a593447800a0b8c68179d7a1c7798c681e627c4059bf2b6a8a9da0855c352ded2f9e858306f33b888f0e0cb8a4a644be51c3a11ece5455afa8b581fa3c8bbafc48581016bbf7ab694d32ad650e3bf78023") setpriority(0x2, r0, 0x8000000000000001) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000380)='ns/user\x00') socketpair(0x0, 0x6, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_delvlan={0x40, 0x71, 0x0, 0x70bd2a, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x6}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xb}}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000012}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0)="6f77e4fc97b03f9e7293e714dea69459c400d24c7f8510555f34b2b68b28408f22b372e46b3a", 0x26, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="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") setpriority(0x0, 0x0, 0x9) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) 14:37:07 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0}) [ 250.773023][T10380] loop4: detected capacity change from 0 to 224 14:37:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 250.824665][T10380] isofs_fill_super: get root inode failed [ 250.832865][ T3673] hid-generic 0000:0000:0000.003B: hidraw0: HID v0.00 Device [syz1] on syz1 [ 250.843478][ T3707] hid-generic 0000:0000:0000.003C: hidraw1: HID v0.00 Device [syz1] on syz1 [ 250.966642][T10396] loop4: detected capacity change from 0 to 224 [ 251.012962][T10396] isofs_fill_super: get root inode failed [ 251.038839][ T3673] usb 6-1: new high-speed USB device number 12 using dummy_hcd [ 251.278193][ T3673] usb 6-1: Using ep0 maxpacket: 32 [ 251.398424][ T3673] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 251.568324][ T3673] usb 6-1: New USB device found, idVendor=19d2, idProduct=0199, bcdDevice=4d.c4 [ 251.577467][ T3673] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 251.585666][ T3673] usb 6-1: Product: syz [ 251.589883][ T3673] usb 6-1: Manufacturer: syz [ 251.594475][ T3673] usb 6-1: SerialNumber: syz [ 251.601381][ T3673] usb 6-1: config 0 descriptor?? [ 251.639115][ T3673] option 6-1:0.0: GSM modem (1-port) converter detected [ 251.844752][ T3707] usb 6-1: USB disconnect, device number 12 [ 251.852062][ T3707] option 6-1:0.0: device disconnected 14:37:09 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x78, 0x77, 0x25, 0x20, 0x19d2, 0x199, 0x4dc4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{}]}}]}}]}}, 0x0) syz_usb_ep_read(r0, 0x0, 0x0, 0x0) 14:37:09 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/70, 0x46}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:09 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:09 executing program 0: r0 = socket(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f0000000480)={'batadv_slave_1\x00'}) 14:37:09 executing program 2: r0 = syz_clone(0x80250000, &(0x7f0000000140)="13cb9da136a6844645cbfc144d39679eed55a52eead66687c28815190b3ac3faa2a2143f4d4de6e89e01525ee3919fca433edff4305246c40dc4a28114973a30a55524291a22ed76350cdd9caab554c369a4654b1bcd7a5606c10de552436822060689bc26910469bf8f14b3722c28bb7bfd9c5c0e869c0f8fe59be87bf0ee1e8d97c21913393b9c9cdc9582b76d3245c85f952d61fcc92786eb26330afe718d224a8ff3d8306351910555cd9da9f2", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="aeac2b33045f0228b54350656939f5cf732fa97d05ebe537501838c98edba1b08d0a771ece72c2faa718c55b18148fded2a2dfcf55a9e7df5314b305fb6e605d63c4196bc5e172af89a1637181db9227e869c519c84cb3c9bff394282833f3d5131859f7620404f59af56ebd451228ebaef07560a593447800a0b8c68179d7a1c7798c681e627c4059bf2b6a8a9da0855c352ded2f9e858306f33b888f0e0cb8a4a644be51c3a11ece5455afa8b581fa3c8bbafc48581016bbf7ab694d32ad650e3bf78023") setpriority(0x2, r0, 0x8000000000000001) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000380)='ns/user\x00') socketpair(0x0, 0x6, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_delvlan={0x40, 0x71, 0x0, 0x70bd2a, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x6}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xb}}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000012}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0)="6f77e4fc97b03f9e7293e714dea69459c400d24c7f8510555f34b2b68b28408f22b372e46b3a", 0x26, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="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") setpriority(0x0, 0x0, 0x9) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) 14:37:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 252.376131][T10406] loop4: detected capacity change from 0 to 224 [ 252.377734][ T1127] hid-generic 0000:0000:0000.003D: hidraw0: HID v0.00 Device [syz1] on syz1 [ 252.396073][T10405] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 252.416190][T10406] isofs_fill_super: get root inode failed 14:37:09 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:09 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/70, 0x46}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 252.457360][ T3707] hid-generic 0000:0000:0000.003E: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:09 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, 0x0, 0x28) 14:37:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="4812000052006f87"], 0x1248}}, 0x0) [ 252.548931][ T3707] hid-generic 0000:0000:0000.003F: hidraw0: HID v0.00 Device [syz1] on syz1 [ 252.567656][T10419] loop4: detected capacity change from 0 to 224 14:37:09 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/70, 0x46}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 252.603239][ T3707] hid-generic 0000:0000:0000.0040: hidraw1: HID v0.00 Device [syz1] on syz1 [ 252.637092][T10419] isofs_fill_super: get root inode failed [ 252.675612][ T3673] hid-generic 0000:0000:0000.0041: hidraw1: HID v0.00 Device [syz1] on syz1 [ 252.743059][ T14] usb 6-1: new high-speed USB device number 13 using dummy_hcd [ 253.018278][ T14] usb 6-1: Using ep0 maxpacket: 32 [ 253.138422][ T14] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 253.330216][ T14] usb 6-1: New USB device found, idVendor=19d2, idProduct=0199, bcdDevice=4d.c4 [ 253.339392][ T14] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 253.347390][ T14] usb 6-1: Product: syz [ 253.351694][ T14] usb 6-1: Manufacturer: syz [ 253.356295][ T14] usb 6-1: SerialNumber: syz [ 253.362601][ T14] usb 6-1: config 0 descriptor?? [ 253.399890][ T14] option 6-1:0.0: GSM modem (1-port) converter detected [ 253.614564][ T14] usb 6-1: USB disconnect, device number 13 [ 253.621491][ T14] option 6-1:0.0: device disconnected 14:37:10 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/timer_list\x00', 0x0, 0x0) 14:37:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:10 executing program 2: r0 = syz_clone(0x80250000, &(0x7f0000000140)="13cb9da136a6844645cbfc144d39679eed55a52eead66687c28815190b3ac3faa2a2143f4d4de6e89e01525ee3919fca433edff4305246c40dc4a28114973a30a55524291a22ed76350cdd9caab554c369a4654b1bcd7a5606c10de552436822060689bc26910469bf8f14b3722c28bb7bfd9c5c0e869c0f8fe59be87bf0ee1e8d97c21913393b9c9cdc9582b76d3245c85f952d61fcc92786eb26330afe718d224a8ff3d8306351910555cd9da9f2", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="aeac2b33045f0228b54350656939f5cf732fa97d05ebe537501838c98edba1b08d0a771ece72c2faa718c55b18148fded2a2dfcf55a9e7df5314b305fb6e605d63c4196bc5e172af89a1637181db9227e869c519c84cb3c9bff394282833f3d5131859f7620404f59af56ebd451228ebaef07560a593447800a0b8c68179d7a1c7798c681e627c4059bf2b6a8a9da0855c352ded2f9e858306f33b888f0e0cb8a4a644be51c3a11ece5455afa8b581fa3c8bbafc48581016bbf7ab694d32ad650e3bf78023") setpriority(0x2, r0, 0x8000000000000001) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000380)='ns/user\x00') socketpair(0x0, 0x6, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_delvlan={0x40, 0x71, 0x0, 0x70bd2a, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x6}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xb}}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000012}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0)="6f77e4fc97b03f9e7293e714dea69459c400d24c7f8510555f34b2b68b28408f22b372e46b3a", 0x26, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="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") setpriority(0x0, 0x0, 0x9) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) 14:37:10 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:10 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x78, 0x77, 0x25, 0x20, 0x19d2, 0x199, 0x4dc4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{}]}}]}}]}}, 0x0) syz_usb_ep_read(r0, 0x0, 0x0, 0x0) 14:37:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x6, &(0x7f0000000140), 0x8) 14:37:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 254.148799][T10433] loop4: detected capacity change from 0 to 224 [ 254.152066][ T1127] hid-generic 0000:0000:0000.0042: hidraw0: HID v0.00 Device [syz1] on syz1 [ 254.168700][ T3749] hid-generic 0000:0000:0000.0043: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:11 executing program 0: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @empty}}}) [ 254.215675][T10433] isofs_fill_super: get root inode failed 14:37:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, 0x0, &(0x7f0000000080)) [ 254.314651][T10453] loop4: detected capacity change from 0 to 224 [ 254.360228][ T3749] hid-generic 0000:0000:0000.0044: hidraw0: HID v0.00 Device [syz1] on syz1 [ 254.375905][T10453] isofs_fill_super: get root inode failed [ 254.468223][ T22] usb 6-1: new high-speed USB device number 14 using dummy_hcd [ 254.708166][ T22] usb 6-1: Using ep0 maxpacket: 32 [ 254.828301][ T22] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 254.998684][ T22] usb 6-1: New USB device found, idVendor=19d2, idProduct=0199, bcdDevice=4d.c4 [ 255.007766][ T22] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 255.021611][ T22] usb 6-1: Product: syz [ 255.026325][ T22] usb 6-1: Manufacturer: syz [ 255.031015][ T22] usb 6-1: SerialNumber: syz [ 255.038674][ T22] usb 6-1: config 0 descriptor?? [ 255.075300][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.079327][ T22] option 6-1:0.0: GSM modem (1-port) converter detected [ 255.081644][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.293980][ T3707] usb 6-1: USB disconnect, device number 14 [ 255.309657][ T3707] option 6-1:0.0: device disconnected 14:37:12 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x78, 0x77, 0x25, 0x20, 0x19d2, 0x199, 0x4dc4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{}]}}]}}]}}, 0x0) syz_usb_ep_read(r0, 0x0, 0x0, 0x0) 14:37:12 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002240)={0x6, 0x7, &(0x7f0000000080)=@framed={{}, [@map_val, @map_idx_val]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:12 executing program 2: r0 = syz_clone(0x80250000, &(0x7f0000000140)="13cb9da136a6844645cbfc144d39679eed55a52eead66687c28815190b3ac3faa2a2143f4d4de6e89e01525ee3919fca433edff4305246c40dc4a28114973a30a55524291a22ed76350cdd9caab554c369a4654b1bcd7a5606c10de552436822060689bc26910469bf8f14b3722c28bb7bfd9c5c0e869c0f8fe59be87bf0ee1e8d97c21913393b9c9cdc9582b76d3245c85f952d61fcc92786eb26330afe718d224a8ff3d8306351910555cd9da9f2", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="aeac2b33045f0228b54350656939f5cf732fa97d05ebe537501838c98edba1b08d0a771ece72c2faa718c55b18148fded2a2dfcf55a9e7df5314b305fb6e605d63c4196bc5e172af89a1637181db9227e869c519c84cb3c9bff394282833f3d5131859f7620404f59af56ebd451228ebaef07560a593447800a0b8c68179d7a1c7798c681e627c4059bf2b6a8a9da0855c352ded2f9e858306f33b888f0e0cb8a4a644be51c3a11ece5455afa8b581fa3c8bbafc48581016bbf7ab694d32ad650e3bf78023") setpriority(0x2, r0, 0x8000000000000001) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000380)='ns/user\x00') socketpair(0x0, 0x6, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_delvlan={0x40, 0x71, 0x0, 0x70bd2a, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x6}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xb}}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000012}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0)="6f77e4fc97b03f9e7293e714dea69459c400d24c7f8510555f34b2b68b28408f22b372e46b3a", 0x26, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="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") setpriority(0x0, 0x0, 0x9) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) 14:37:12 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) [ 255.843813][T10467] loop4: detected capacity change from 0 to 224 [ 255.848495][ T3707] hid-generic 0000:0000:0000.0046: hidraw0: HID v0.00 Device [syz1] on syz1 [ 255.850382][ T140] hid-generic 0000:0000:0000.0045: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@ipmr_delroute={0x1c, 0x6b}, 0x1c}}, 0x0) [ 255.910749][T10467] isofs_fill_super: get root inode failed 14:37:12 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x160800, 0x0) 14:37:12 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2382, 0x0) [ 256.011162][T10479] loop4: detected capacity change from 0 to 224 [ 256.046474][T10479] isofs_fill_super: get root inode failed 14:37:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 256.150892][T10487] loop4: detected capacity change from 0 to 224 [ 256.169061][T10487] isofs_fill_super: get root inode failed [ 256.179457][ T22] usb 6-1: new high-speed USB device number 15 using dummy_hcd [ 256.459024][ T22] usb 6-1: Using ep0 maxpacket: 32 [ 256.588558][ T22] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 256.768747][ T22] usb 6-1: New USB device found, idVendor=19d2, idProduct=0199, bcdDevice=4d.c4 [ 256.777887][ T22] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 256.785998][ T22] usb 6-1: Product: syz [ 256.793075][ T22] usb 6-1: Manufacturer: syz [ 256.797656][ T22] usb 6-1: SerialNumber: syz [ 256.804630][ T22] usb 6-1: config 0 descriptor?? [ 256.860112][ T22] option 6-1:0.0: GSM modem (1-port) converter detected [ 257.076250][ T22] usb 6-1: USB disconnect, device number 15 [ 257.082973][ T22] option 6-1:0.0: device disconnected 14:37:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000f80)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x2}]}}}], 0x18}}], 0x1, 0x0) 14:37:14 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x20000001}) 14:37:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:14 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:14 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:14 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$tipc(r0, &(0x7f0000000280), &(0x7f0000000080)=0x10) 14:37:14 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x1496c1) syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) 14:37:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_mreqn(r0, 0x9, 0x0, 0x0, 0xfffffffffffffffc) 14:37:14 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x2) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8}, 0x8) [ 257.614461][ T3707] hid-generic 0000:0000:0000.0047: hidraw0: HID v0.00 Device [syz1] on syz1 [ 257.624842][ T140] hid-generic 0000:0000:0000.0048: hidraw1: HID v0.00 Device [syz1] on syz1 [ 257.625342][T10495] loop4: detected capacity change from 0 to 224 14:37:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, 0x0, 0x0) 14:37:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000840)={&(0x7f0000000780), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) 14:37:14 executing program 5: socket(0x0, 0xe2bb6a96ba284f22, 0x0) [ 257.693632][T10495] isofs_fill_super: get root inode failed 14:37:14 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ext4\x00', 0x0, 0x0) 14:37:14 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000005b00)=[{{&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000002580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) [ 257.797192][T10515] loop4: detected capacity change from 0 to 224 [ 257.818936][ T105] block nbd0: Attempted send on invalid socket [ 257.825528][ T105] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 257.836480][T10517] EXT4-fs (nbd0): unable to read superblock [ 257.857847][T10515] isofs_fill_super: get root inode failed [ 257.905701][ T3639] I/O error, dev loop4, sector 32 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:37:15 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000140), 0x8) 14:37:15 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x0, 0x0, 0x5}, 0x48) 14:37:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x2, 0x0, 0x3}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:15 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 14:37:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x6, &(0x7f0000000000)=@framed={{}, [@initr0, @jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xe00) 14:37:15 executing program 2: r0 = socket(0x2, 0xa, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) [ 258.487628][T10527] loop4: detected capacity change from 0 to 224 [ 258.518763][ T140] hid-generic 0000:0000:0000.0049: hidraw0: HID v0.00 Device [syz1] on syz1 [ 258.521404][ T1127] hid-generic 0000:0000:0000.004A: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x2f8, 0xffffffff, 0x0, 0x98, 0x98, 0xffffffff, 0xffffffff, 0x2b0, 0x2b0, 0x2b0, 0xffffffff, 0x4, 0x0, {[{{@ip={@broadcast, @empty, 0x0, 0x0, 'team_slave_1\x00', 'vlan1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@AUDIT={0x28}}, {{@ip={@rand_addr, @dev, 0x0, 0x0, 'gre0\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@set={{0x40}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'veth0\x00', 'team0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x358) 14:37:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000004640)=[{{&(0x7f0000000000)=@l2, 0x80, 0x0}}], 0x1, 0x0) [ 258.563290][T10527] isofs_fill_super: get root inode failed [ 258.652010][T10546] loop4: detected capacity change from 0 to 224 [ 258.705783][ T3639] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:37:16 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:16 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:16 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) 14:37:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, 0x0) 14:37:16 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, &(0x7f0000002400)={0x2020}, 0x2020) 14:37:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="4812000021006f"], 0x1248}}, 0x0) 14:37:16 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x8, &(0x7f0000000180)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}}) 14:37:16 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) timerfd_gettime(r0, 0x0) 14:37:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 259.372273][T10553] loop4: detected capacity change from 0 to 224 [ 259.406632][ T140] hid-generic 0000:0000:0000.004B: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:16 executing program 0: syz_mount_image$fuse(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x202800, &(0x7f00000002c0)) 14:37:16 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2c011, r0, 0x0) [ 259.466556][ T140] hid-generic 0000:0000:0000.004C: hidraw1: HID v0.00 Device [syz1] on syz1 [ 259.514309][T10568] loop4: detected capacity change from 0 to 224 [ 259.798195][ T140] usb 3-1: new high-speed USB device number 13 using dummy_hcd [ 260.098311][ T140] usb 3-1: Using ep0 maxpacket: 16 14:37:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000140), 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000000), 0x8) 14:37:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:17 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:17 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@ipmr_delroute={0x1c, 0x11, 0x1}, 0x1c}}, 0x0) 14:37:17 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={'L+'}, 0x16, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80), 0x0, 0x0, 0x0) [ 260.290507][T10577] loop4: detected capacity change from 0 to 224 [ 260.323643][ T22] hid-generic 0000:0000:0000.004D: hidraw0: HID v0.00 Device [syz1] on syz1 [ 260.338639][ T3707] hid-generic 0000:0000:0000.004E: hidraw1: HID v0.00 Device [syz1] on syz1 [ 260.360784][ T140] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 260.375985][ T140] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 260.386600][ T140] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 260.403146][ T140] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 260.417824][ T140] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 260.427714][ T140] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 260.608351][ T140] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 260.621515][ T140] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 260.629951][ T140] usb 3-1: Product: syz [ 260.634123][ T140] usb 3-1: Manufacturer: syz [ 260.642595][ T140] usb 3-1: SerialNumber: syz [ 260.938297][ T140] cdc_ncm 3-1:1.0: bind() failure [ 260.945508][ T140] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 260.952533][ T140] cdc_ncm 3-1:1.1: bind() failure [ 260.960233][ T140] usb 3-1: USB disconnect, device number 13 14:37:18 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x8, &(0x7f0000000180)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}}) 14:37:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:37:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 14:37:18 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:18 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:18 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000200)=""/188) [ 261.442505][T10599] loop4: detected capacity change from 0 to 224 [ 261.449396][ T140] hid-generic 0000:0000:0000.004F: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:37:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 14:37:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x14, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 261.491420][ T22] hid-generic 0000:0000:0000.0050: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 261.577577][ T3639] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:37:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000280), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@noacl}, {@fault_injection}, {@fault_injection}, {@fault_injection}], [{@fsmagic}, {@seclabel}, {@hash}, {@pcr}, {@pcr}, {@smackfsfloor={'smackfsfloor', 0x3d, 'c'}}, {@fsmagic}]}) [ 261.651340][T10613] loop4: detected capacity change from 0 to 224 [ 261.748209][ T3707] usb 3-1: new high-speed USB device number 14 using dummy_hcd [ 261.988527][ T3707] usb 3-1: Using ep0 maxpacket: 16 [ 262.188772][ T3707] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 262.203929][ T3707] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 262.213956][ T3707] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 262.226889][ T3707] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 262.237496][ T3707] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 262.251287][ T3707] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 262.418471][ T3707] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 262.427645][ T3707] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 262.435746][ T3707] usb 3-1: Product: syz [ 262.439994][ T3707] usb 3-1: Manufacturer: syz [ 262.444595][ T3707] usb 3-1: SerialNumber: syz [ 262.728300][ T3707] cdc_ncm 3-1:1.0: bind() failure [ 262.735183][ T3707] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 262.742235][ T3707] cdc_ncm 3-1:1.1: bind() failure [ 262.752979][ T3707] usb 3-1: USB disconnect, device number 14 14:37:20 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x8, &(0x7f0000000180)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}}) 14:37:20 executing program 0: setpriority(0x2, 0x0, 0x8000000000000001) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) socketpair(0x0, 0x0, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f79944fba20fd453b9a46a07cc0ef3306ac6691f0090e8c3dcea8842ac253f687adea832c2365ac3b2ad97f9e400af84b358d320c831ef3189f93e49878d88abfad6dc897eb239f19738603dace7d0d9e2f9282462ec06def3522331efa2e25148b1a1983640d608ecc3cea003431922e03af4c4282a80ac950f42a97f3bdb9f4be734277d4f68303e22d75545dcea4398086d1ae2a28f1647a3d6a06a769062cf1b992cd403e52c47d54f7a4e8944670b34779f30ad1f746ac84071745a346e2a7db95389081b116ab73b1fe15b40ac94acaea22c6cc7dad242072c780a8c2744d89788f000545348757d6eb8bd4244083123fbc851d3bd1440fd6ea98e0cad65ef1a4e9e06182eaeaf4a35fe7f7390d59476d97e5a7c07988103ff352e0bbd58f1b18f520b8e5a50fe3418358456a2ba0ce3feff5fe04ce7785b432518050f87dc0d17702d9a2926596d6ef3059273913126f4c14741159247c56bb5cab5429bdda140e9be051a6dd124c610bef78b392805b54b3b3c4468492792ba6f09fb958fc3962799ac5c3fbcf8ab6e9903285314a628bca6789b231336f0ae3c3eef488da26389a0e7a13f3352c715cb1b23a7481c3ae49a855f04e99cc907b6a8a7e34b8e36ca9b37bd15f025769e618ad3f4ad84ac8e1298291d225ce163a0ad044eb27a03f8db157c5bcd7e93e67452e5385a938f33594d8601ae84b96539e1d8b95503ec8a9df158c0a6c02851d1f57ca216f70ed2763f2a14a9688b53bd9cea329b2438eb0469556a5faef3bee21cdc93d2fc5fa03d31fed135faccc87523c936a120c2a594b9a54db9c4dbc9356d64433a92993fb1bcbcdc993dd8a8483e8a0dd52dc904969bfabafc4f9179a9fb200904fca1d1d281e104f613d1ec4f27726ae15ac7eca6ffeef200430c936af4bd5469b08bc717cb35567e068038f745feff2f9e25dbf6970fd38351e2d77f1621e970b1054f8f7edaf462644169f81c64d549e0527abaa27122d28a9f0d21d988e1d80fb6614b48cccc5799a4b17a00d5bb29d501fbf742d64cf578a1be4de3450cbbcd5da587f15d1f326de90976d72201d18767931985955b5129d242aaa0ed0d30f4349aa9125b200018348386401ffa5b698117ee88aae24fc84ae794693196e13e50a5b2de3b97728c26fe4b0960b42a5aec60f49179744ea3b3890ab92bfb599de8137952cde54a286d6ad5e3d2535e88319f57df6b6c27ce3b571cd8141e83aeab23809d347cbdfc84bf84665312ba944fac602cd2e0390e495543f1e27f4ee05a26cdf2e7664d43682498797b99618020b96240f28ec3ecf985cb6ad62f2524606c1c0b2a5699ee06ad8dc2b1fe8ab09bc354a9ebac192974ff6083558ddafe2c8eb7ff0bbb4a65440f161d6e18a56f37500da88789c503083eb5a354ea625192a8739365ea82e526defd3c2bd3af1f56fd8d29319071f982b4259a7f6a1d0c6b0218788a7ef81a3089eb5184399b67bfcfd167274b4577b6950e5934cd7e07f893af18a5cc3e312bea9498b7e410e5362cbb2f3a081605739b503042bb47ba8e46ad7a9228f80709ed6be27380fe46278604d11274a573793e5f5285e84b6d5ba8df82f314d4b222f8f4060aaf43bb9aaf8cd508932ab1bb67db61fa250e1a348ddd5efd07da06d6bf790c27839f1085eedf723fa12b290d9e91fdbdb52cfabfd2761f1d8bcc9b9541c35677ab5cef28f60717c627a62b68afa8aecbb6fa2b826e4536aee1c0ea15c427d3ee37e7a2ebd28ea5f20bfe56f9af03d371d8c830364f1b43fe068f453cff84b3a28388872d88408367e93b65bda6f41e259b84b46ee67b681e94f4b3627bd18a70c84b708726a58a9a5c099827526373325d4952c80b179e337fe5ea283196e3155da38003f0d586649b44e0ef79cddaa473b16e8bbe1e184f6c75ff0ee97373311442af4da7cb42d6e451cb4ab38d58f0a37532e0d19860f2138cd9f7007f7f4de052cc844a30896543dd1f99b662269cecee93614d8ec86d7a2051af06703c152480fb7a281f57d24cab8e8fe079a40781218824fe41ad588aca9893e38163511c3e5e9a17b1e18b455a07f3b119d874fa5a0813a8943c9384242aeaed16fcc1864b4ad8e29a1716e8f0094058b609523c1741c9b8c5750c404f667a91287e6dd258e9e999900dd1c1f289ca08695ae2c8a7e8f449946ada00d842124b68a61caf4c2078c390671437bd69b2c3ff27174bc777ff3e26b045e5c24ea73e6fd18cd8cc80a2d6b39f27f883ed29ddd4eace77af362877843b70e7806bbeedb6f8ad5392086b18e74fa8c165f8b43384f2de4f20adb1661f55c1cffe8254360412918c0b3401b238c0ac388a436e0559b44dcce84b5f3462d556a37408092e4f190aadd224bf1d7cc8d1837f93ed0036b3f85ddf0e4128a3b180cb54b47bfbc3ec2506c8480e29d05322fefe44d7f236064b9c899a067999a5f560f87c00e8b72487b7b6f5b79f7e9ccfbe35df91c64e1021cfa07fd8b540981ef1eec6c8b965de8df24d9d30a82b051738695d040b8fe63499cd18bb5fb8ad999d5d87cb8e5ee0063fb7d0dffc615a91802b40f1bbf9335d17dbce8ebdf93e49d422d22eda97ed5ffeedb24a8de418bc433bbbfdab11e0aa550803cfbe19b1a5b73ec0ecad90776d56fedcbe68faeb24ac4c3e11b20bdb93310801eee78106e39d74c77386bdf5bb2abfa7d457f0bab2cb6726d4b7aa3770daded44019506c409123b27404e96e12f04cec3b35bac7719a836482d608f38dbb1b5de3de35cc3446838e7d607468c73a0d2cb50d6b7a95d1969f670953b4909b38a819a78ac367aed7f544577183e79d680ee43603ffe8d27f9133620e5411754b17424668eb17f00fe5e502036435a2cb1ba8f70d12e5c97f7ea7425e6c5fae7b719c71568390e1d1fc40856fe00272f768306d4144f3f4a55039e566d3da6147ca797338f4deb6aa162e07b7bab9a861b3b028d4102639de622be4e3e929763fb66b0f03f0580baab64c26297fb3023ff29d5fccea73974009c85608733f153ff32652d3d4ecfcee5f897959288be05280c57e4e963da107278b72aed44082a1bee6fa07369f74190e644489360f3c5a81aaf3b87765c37f4c9049efb7e6c1277563bf702baef106425138ceb64720c48776cb2dde8d9a3f38c2015352b7e8e8bf92d4632d499454ebd56b1be4409bd03a5a526736fbf1f246fb9e0bbe4fd0e8c842460c59a25ddb88c0827c1801e39a0b35bf0e396f9683fde51cb5fbc114b10c444ca98edd397efb796b2e847227f78a9b6cc578818e25a9ef778cbb7c8c0dfee1ca1236a5eb71a639f009ee8b9056ff6af71008b214953cdd7d17d98a5a283969f0c1f30115ffa71c90c271dc76146f5f96141a28c168aec2dc0d5e19811bfb52550d6588d01f0c9827370eb3f6e61eef88ad6554183de01b83adb63f66aee03ebebd976b60743501225f0dd32e35eb4cca12c47adb2f16ba7624348c18402a3fc3a55d2fa3836cfa21c05d0de49ee5de5dab94d8fa3017f55c1462e85021b36ef7d1117c0262b2be7ff70e7c778fbc16838f16f8b0ba28a37fa38cbf1f6f1053aabea7c81ea4674be40c1daf9cbc24fdfd0e7df326c15d5fc9760ad41d407de96b8b4380f225005d59857d36cf41671aafc63f6074d9e504cc1fbe1fabd01131252f2c2759846a0061fb7458e59af134e5c9fb09257da40947441b64d7a89846d3e327f8c2f97b3fe1e14c7c5676d0317703a6bd8193a7e97bfd221f57e8b0e1b519a4fcf9bea93431bc0fd110e94b68939a005a2e2158f1fffa116ffbc15f92277c8b1bff2f6be7d33e665ea1195e0912cfe4d049c29f1ae50c898412e4a0fb4fbb6acf24917c3de3f5d836cb0add890bae18f570ac4cc20295ff724cd8c538b1319891c759b9914e859f423ad1e632bd8e0eb28329ed256c5437901e3575b71eba2e8a11bf1e6d2db6b2c91aa01a040b22236b486b35b03b9bf3dfd6111fe46d28bc6ef96812962d7fbe2a99a4b748174919ddbf2ae702b0ac3c651f8ed43b7ddc10d3b45fae5120b1605af0e62b63995c2b1e1aa07f080b204b4441addd38403e6b58e5ae3d27866046feffe2de57540c52be7bbfde98f5dda3612d62ba1dda05e1e03b7d0c121800704a17e2841da62e9b3322a2ae20c1ec399cde0fcb157bca3febcbd55a49fbed86a2c5fb2b56a2302fa0b13b0ce8ffadc8c186db824fca06d1f9d0f1df30dc56e800988244360f6ae42c38d254584a420e5952c65d33977137e9147c4473f91148f6586bc74de61785b0cea7753c3e04c406f01a0fa5ef54f96e27b92a10") ptrace$getregset(0x4204, 0x0, 0x4, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) 14:37:20 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 14:37:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, 0x0, 0x0, 0x69, 0x0) 14:37:20 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:20 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 263.232397][ T22] hid-generic 0000:0000:0000.0051: hidraw0: HID v0.00 Device [syz1] on syz1 [ 263.236595][ T14] hid-generic 0000:0000:0000.0052: hidraw1: HID v0.00 Device [syz1] on syz1 [ 263.254860][T10624] loop4: detected capacity change from 0 to 224 14:37:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, 0x0, 0x0, 0x69, 0x0) 14:37:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890d, 0x0) 14:37:20 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000004240), 0x0, 0x101) write$FUSE_GETXATTR(r0, &(0x7f0000008480)={0x18}, 0x18) 14:37:20 executing program 0: setpriority(0x2, 0x0, 0x8000000000000001) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) socketpair(0x0, 0x0, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="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") ptrace$getregset(0x4204, 0x0, 0x4, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) [ 263.406791][T10633] loop4: detected capacity change from 0 to 224 14:37:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, 0x0, 0x0, 0x69, 0x0) 14:37:20 executing program 5: socketpair(0x22, 0x0, 0x0, &(0x7f0000000a00)) [ 263.530106][T10639] loop4: detected capacity change from 0 to 224 [ 263.558370][ T14] usb 3-1: new high-speed USB device number 15 using dummy_hcd [ 263.798242][ T14] usb 3-1: Using ep0 maxpacket: 16 [ 263.998428][ T14] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 264.009672][ T14] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 264.020193][ T14] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 264.030331][ T14] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 264.040772][ T14] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 264.055340][ T14] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 264.218449][ T14] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 264.227572][ T14] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 264.240595][ T14] usb 3-1: Product: syz [ 264.245125][ T14] usb 3-1: Manufacturer: syz [ 264.249849][ T14] usb 3-1: SerialNumber: syz [ 264.528371][ T14] cdc_ncm 3-1:1.0: bind() failure [ 264.537761][ T14] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 264.544753][ T14] cdc_ncm 3-1:1.1: bind() failure [ 264.555523][ T14] usb 3-1: USB disconnect, device number 15 14:37:21 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x8, &(0x7f0000000180)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}}) 14:37:21 executing program 5: syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000080)="2d7be7293e27acb2", 0x8, 0xfffffffffffffff9}], 0x0, 0x0) 14:37:21 executing program 0: setpriority(0x2, 0x0, 0x8000000000000001) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) socketpair(0x0, 0x0, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="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") ptrace$getregset(0x4204, 0x0, 0x4, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) 14:37:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 14:37:21 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:21 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:21 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) [ 265.048660][T10656] loop4: detected capacity change from 0 to 224 [ 265.056821][ T14] hid-generic 0000:0000:0000.0053: hidraw0: HID v0.00 Device [syz1] on syz1 [ 265.076259][ T1127] hid-generic 0000:0000:0000.0054: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x804) 14:37:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 14:37:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, 0x0, 0x0) 14:37:22 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="050f0c00240710"]}) 14:37:22 executing program 0: setpriority(0x2, 0x0, 0x8000000000000001) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) socketpair(0x0, 0x0, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x4) syz_clone(0x44000300, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="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") ptrace$getregset(0x4204, 0x0, 0x4, &(0x7f00000015c0)={&(0x7f0000001540)=""/89, 0x59}) [ 265.258488][T10674] loop4: detected capacity change from 0 to 224 [ 265.381616][ T1127] usb 3-1: new high-speed USB device number 16 using dummy_hcd [ 265.518367][ T14] usb 6-1: new high-speed USB device number 16 using dummy_hcd [ 265.638213][ T1127] usb 3-1: Using ep0 maxpacket: 16 [ 265.758373][ T14] usb 6-1: Using ep0 maxpacket: 16 [ 265.838367][ T1127] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 265.849641][ T1127] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 265.859836][ T1127] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 265.870304][ T1127] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 265.884098][ T1127] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 265.901571][ T1127] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 265.978540][ T14] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 265.990585][ T14] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 266.000710][ T14] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 266.010834][ T14] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 266.020890][ T14] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 266.030975][ T14] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 266.068364][ T1127] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 266.077445][ T1127] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 266.087111][ T1127] usb 3-1: Product: syz [ 266.091354][ T1127] usb 3-1: Manufacturer: syz [ 266.095947][ T1127] usb 3-1: SerialNumber: syz [ 266.198370][ T14] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 266.207458][ T14] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 266.220081][ T14] usb 6-1: Product: syz [ 266.224316][ T14] usb 6-1: Manufacturer: syz [ 266.230867][ T14] usb 6-1: SerialNumber: syz [ 266.378337][ T1127] cdc_ncm 3-1:1.0: bind() failure [ 266.385672][ T1127] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 266.393231][ T1127] cdc_ncm 3-1:1.1: bind() failure [ 266.409872][ T1127] usb 3-1: USB disconnect, device number 16 [ 266.508472][ T14] cdc_ncm 6-1:1.0: bind() failure [ 266.515515][ T14] cdc_ncm 6-1:1.1: CDC Union missing and no IAD found [ 266.522691][ T14] cdc_ncm 6-1:1.1: bind() failure [ 266.531091][ T14] usb 6-1: USB disconnect, device number 16 14:37:23 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2c011, r0, 0x0) 14:37:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 14:37:23 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:23 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 14:37:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) 14:37:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000012700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000000480)="2719c0d90100", 0x6, 0x10000}], 0x0, &(0x7f0000000380)=ANY=[]) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x21e54f53d212f8bd) [ 266.882479][ T3707] hid-generic 0000:0000:0000.0055: hidraw0: HID v0.00 Device [syz1] on syz1 [ 266.896884][T10688] loop4: detected capacity change from 0 to 224 [ 266.911703][ T22] hid-generic 0000:0000:0000.0056: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x14, 0x0, 0x0) 14:37:23 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @random="fee9a55accef", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty, @multicast1}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 14:37:23 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffffffffffffff87) 14:37:23 executing program 4: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1f000000971900002e2f66696c653000cb900b60f82dd622c868d489efe76e8addf6702707556f3e63bb9cf674438dc74d0ee9b2422e4352e7b23886e4e55a80376df14f6c7a8aa1a6926bc41141afc333b2ebe01b32b0ff8017a6b7924f60e93a81fc0f9dce5906bf15c5a82248f7ef8eb00fd7e420e92fb9a43c59f65eaf6598db06390a896f8c40706109563af1c2f769e53c081762a54e94873d2ad56231597152caf1a1450f"]) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpu.stat\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2fa17abff7bceeacfe4a00"/26], 0x8) openat$cgroup_int(r3, 0x0, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x81901) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, @isdn={0x22, 0x8, 0x7f, 0x6}, @qipcrtr={0x2a, 0xffffffff00000003, 0x3fff}, @ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='virt_wifi0\x00', 0x0, 0x6, 0x12}) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYRESOCT], 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) 14:37:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x22, 0x0, 0x0) 14:37:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x17, 0x0, 0x0) 14:37:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x4b, 0x0, 0x0) 14:37:24 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:24 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x10, 0x0, 0x7) 14:37:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x12, 0x0, 0x7) 14:37:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x4b, 0x0, 0x0) 14:37:24 executing program 4: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000005c0)=ANY=[@ANYBLOB="b87cce42dd2a37f0de54188991b5f66c70e782fd8cba0300000000000000782e5faa0805ffe6db86daf941553a2c0767d1db3a80a7ed78091b5d01a0a9f2c446980b426484557b09754e708ed1aa91ac3ec29a611c2349c66b06d7fbba3981d9e7a0e35c0000229f5ba3e81dd1f6d6c600800000000000003f14e6a36e4678b26f13b020f60bcc2111d3011bf62e54f01e2ca2ea03fad21a1d74d4ea70b97e30ecc13cee478ac1f16b1d1084fa1de861faccd6921d87e5f46e11a286ef6cacb7c56ce097db2c3c3dd77054e5bf1412c880552685d00904cc40983779c61c2589168bb5cdd386785e5197b37740b169b2c5ff696f3de7c7ad4d12de71efc9d867cf062a6eeb0c0bb75129fc4862c18ef0184b5c8052d17caf66a9b2d2d083f0aa88f5d7badb4b0cebf2cd82c2454240d6ffd06a6870c3edeed81955592694b2ef2a56d8885a2c0b4c54fe2a94fdaef7dd428e147ade88b956258b1ea02875479b70fb8f9d62805e01627bed6a15d9ef07e4b277b143524c57b98d80ef76c685c6", @ANYRES32=0x0, @ANYBLOB="1f000000971900002e2f66696c653000cb900b60f82dd622c868d489efe76e8addf6702707556f3e63bb9cf674438dc74d0ee9b2422e4352e7b23886e4e55a80376df14f6c7a8aa1a6926bc41141afc333b2ebe01b32b0ff8017a6b7924f60e93a81fc0f9dce5906bf15c5a82248f7ef8eb00fd7e420e92fb9a43c59f65eaf6598db06390a896f8c40706109563af1c2f769e53c081762a54e94873d2ad56231597152caf1a1450f"]) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpu.stat\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2fa17abff7bceeacfe4a00"/26], 0x8) openat$cgroup_int(r3, 0x0, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x81901) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, @isdn={0x22, 0x8, 0x7f, 0x6}, @qipcrtr={0x2a, 0xffffffff00000003, 0x3fff}, @ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='virt_wifi0\x00', 0x0, 0x6, 0x12}) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYRESOCT], 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) 14:37:24 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1f000000971900002e2f66696c653000cb900b60f82dd622c868d489efe76e8addf6702707556f3e63bb9cf674438dc74d0ee9b2422e4352e7b23886e4e55a80376df14f6c7a8aa1a6926bc41141afc333b2ebe01b32b0ff8017a6b7924f60e93a81fc0f9dce5906bf15c5a82248f7ef8eb00fd7e420e92fb9a43c59f65eaf6598db06390a896f8c40706109563af1c2f769e53c081762a54e94873d2ad56231597152caf1a1450f"]) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpu.stat\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2fa17abff7bceeacfe4a00"/26], 0x8) openat$cgroup_int(r3, 0x0, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x81901) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, @isdn={0x22, 0x8, 0x7f, 0x6}, @qipcrtr={0x2a, 0xffffffff00000003, 0x3fff}, @ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='virt_wifi0\x00', 0x0, 0x6, 0x12}) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYRESOCT], 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) 14:37:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x4b, 0x0, 0x0) 14:37:24 executing program 5: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1f000000971900002e2f66696c653000cb900b60f82dd622c868d489efe76e8addf6702707556f3e63bb9cf674438dc74d0ee9b2422e4352e7b23886e4e55a80376df14f6c7a8aa1a6926bc41141afc333b2ebe01b32b0ff8017a6b7924f60e93a81fc0f9dce5906bf15c5a82248f7ef8eb00fd7e420e92fb9a43c59f65eaf6598db06390a896f8c40706109563af1c2f769e53c081762a54e94873d2ad56231597152caf1a1450f"]) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpu.stat\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2fa17abff7bceeacfe4a00"/26], 0x8) openat$cgroup_int(r3, 0x0, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x81901) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, @isdn={0x22, 0x8, 0x7f, 0x6}, @qipcrtr={0x2a, 0xffffffff00000003, 0x3fff}, @ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='virt_wifi0\x00', 0x0, 0x6, 0x12}) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYRESOCT], 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) [ 267.741040][ T3671] hid-generic 0000:0000:0000.0057: hidraw0: HID v0.00 Device [syz1] on syz1 [ 267.816845][ T3671] hid-generic 0000:0000:0000.0058: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x4b, 0x0, 0x0) 14:37:24 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @random="fee9a55accef", @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "262b82", 0x2, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 14:37:24 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @random="fee9a55accef", @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "262b82", 0x2, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 14:37:25 executing program 4: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1f000000971900002e2f66696c653000cb900b60f82dd622c868d489efe76e8addf6702707556f3e63bb9cf674438dc74d0ee9b2422e4352e7b23886e4e55a80376df14f6c7a8aa1a6926bc41141afc333b2ebe01b32b0ff8017a6b7924f60e93a81fc0f9dce5906bf15c5a82248f7ef8eb00fd7e420e92fb9a43c59f65eaf6598db06390a896f8c40706109563af1c2f769e53c081762a54e94873d2ad56231597152caf1a1450f"]) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpu.stat\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2fa17abff7bceeacfe4a00"/26], 0x8) openat$cgroup_int(r3, 0x0, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x81901) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, @isdn={0x22, 0x8, 0x7f, 0x6}, @qipcrtr={0x2a, 0xffffffff00000003, 0x3fff}, @ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='virt_wifi0\x00', 0x0, 0x6, 0x12}) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYRESOCT], 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) 14:37:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r2, 0x0) 14:37:25 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:25 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:37:25 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @random="fee9a55accef", @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "262b82", 0x2, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 14:37:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x5, 0x0, 0x0) 14:37:25 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @random="fee9a55accef", @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "262b82", 0x2, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 14:37:25 executing program 2: r0 = socket(0x1, 0x3, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0, 0x278}}, 0x0) 14:37:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 268.654589][ T3671] hid-generic 0000:0000:0000.0059: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x6, 0x0, 0x0) [ 268.724951][ T3707] hid-generic 0000:0000:0000.005A: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x38, 0x0, 0x7) 14:37:25 executing program 5: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "262b92", 0x20, 0x6, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}, @rand_addr=' \x01\x00', {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) 14:37:25 executing program 4: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000005c0)=ANY=[@ANYBLOB="b87cce42dd2a37f0de54188991b5f66c70e782fd8cba0300000000000000782e5faa0805ffe6db86daf941553a2c0767d1db3a80a7ed78091b5d01a0a9f2c446980b426484557b09754e708ed1aa91ac3ec29a611c2349c66b06d7fbba3981d9e7a0e35c0000229f5ba3e81dd1f6d6c600800000000000003f14e6a36e4678b26f13b020f60bcc2111d3011bf62e54f01e2ca2ea03fad21a1d74d4ea70b97e30ecc13cee478ac1f16b1d1084fa1de861faccd6921d87e5f46e11a286ef6cacb7c56ce097db2c3c3dd77054e5bf1412c880552685d00904cc40983779c61c2589168bb5cdd386785e5197b37740b169b2c5ff696f3de7c7ad4d12de71efc9d867cf062a6eeb0c0bb75129fc4862c18ef0184b5c8052d17caf66a9b2d2d083f0aa88f5d7badb4b0cebf2cd82c2454240d6ffd06a6870c3edeed81955592694b2ef2a56d8885a2c0b4c54fe2a94fdaef7dd428e147ade88b956258b1ea02875479b70fb8f9d62805e01627bed6a15d9ef07e4b277b143524c57b98d80ef76c685c6", @ANYRES32=0x0, @ANYBLOB="1f000000971900002e2f66696c653000cb900b60f82dd622c868d489efe76e8addf6702707556f3e63bb9cf674438dc74d0ee9b2422e4352e7b23886e4e55a80376df14f6c7a8aa1a6926bc41141afc333b2ebe01b32b0ff8017a6b7924f60e93a81fc0f9dce5906bf15c5a82248f7ef8eb00fd7e420e92fb9a43c59f65eaf6598db06390a896f8c40706109563af1c2f769e53c081762a54e94873d2ad56231597152caf1a1450f"]) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpu.stat\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2fa17abff7bceeacfe4a00"/26], 0x8) openat$cgroup_int(r3, 0x0, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x81901) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, @isdn={0x22, 0x8, 0x7f, 0x6}, @qipcrtr={0x2a, 0xffffffff00000003, 0x3fff}, @ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='virt_wifi0\x00', 0x0, 0x6, 0x12}) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYRESOCT], 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) 14:37:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x19, 0x0, 0x7) 14:37:26 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:37:26 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000080)={{0xfffffffffffffffe}}) 14:37:26 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:37:26 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 14:37:26 executing program 5: syz_mount_image$udf(&(0x7f00000014c0), &(0x7f0000001500)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40), 0x0, &(0x7f0000001c00)={[{@nostrict}]}) 14:37:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x46, 0x0, 0x0) 14:37:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x14, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000100)=0xa, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102382, 0x18fee}], 0x1, 0x0, 0x0, 0x1980}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xc63b9e35) [ 269.513109][ T3671] hid-generic 0000:0000:0000.005B: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:26 executing program 5: syz_mount_image$udf(&(0x7f00000014c0), &(0x7f0000001500)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40), 0x0, &(0x7f0000001c00)={[{@shortad}], [{@dont_measure}]}) 14:37:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/sockstat6\x00') read$eventfd(r0, &(0x7f0000000140), 0x8) 14:37:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) [ 269.595413][ T3671] hid-generic 0000:0000:0000.005C: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 14:37:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x4, 0x0, 0x7) [ 269.716736][T10803] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 14:37:27 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:37:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x42, 0x0, 0x0) [ 270.371333][ T3671] hid-generic 0000:0000:0000.005D: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:27 executing program 5: socketpair(0x28, 0x0, 0x0, &(0x7f0000001c80)) 14:37:27 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000100)) 14:37:27 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:37:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x14, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000100)=0xa, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102382, 0x18fee}], 0x1, 0x0, 0x0, 0x1980}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xc63b9e35) 14:37:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) dup3(r0, r1, 0x0) 14:37:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = dup(r1) setsockopt$inet_buf(r2, 0x0, 0x16, 0x0, 0x0) 14:37:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) [ 270.473009][ T3671] hid-generic 0000:0000:0000.005E: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) 14:37:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) dup3(r0, r1, 0x0) 14:37:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) dup3(r0, r1, 0x0) [ 270.676329][T10836] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 270.717900][T10827] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 14:37:28 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:37:28 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) dup3(r0, r1, 0x0) 14:37:28 executing program 5: openat$sysfs(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 14:37:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x43, 0x0, 0x7) [ 271.236402][ T3707] hid-generic 0000:0000:0000.005F: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:28 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:37:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x35, 0x0, 0x0) 14:37:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x14, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000100)=0xa, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102382, 0x18fee}], 0x1, 0x0, 0x0, 0x1980}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xc63b9e35) [ 271.332549][ T3707] hid-generic 0000:0000:0000.0060: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:28 executing program 5: syz_mount_image$udf(&(0x7f00000014c0), 0x0, 0x0, 0x2, &(0x7f0000001b40)=[{&(0x7f0000001540)='\b', 0x1}, {&(0x7f0000001640)="99", 0x1, 0x35f9c66b}], 0x0, &(0x7f0000001c00)) 14:37:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) 14:37:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) 14:37:28 executing program 5: syz_mount_image$udf(0x0, 0x0, 0x0, 0x7, &(0x7f0000001b40)=[{&(0x7f0000001540)='\b', 0x1}, {&(0x7f0000001740)='!', 0x1}, {&(0x7f0000001800)='l', 0x1}, {&(0x7f0000001840)='\r', 0x1}, {&(0x7f00000018c0)="dd74d7", 0x3, 0xfffffffffffffffe}, {&(0x7f00000019c0)="ab", 0x1}, {&(0x7f0000001a40)="cc", 0x1}], 0x0, 0x0) 14:37:28 executing program 5: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @random="fee9a55accef", @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "262b82", 0xb, 0x2c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) [ 271.587273][T10857] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 271.647631][T10862] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:37:28 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x4) 14:37:28 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x8, 0x0, 0x7) 14:37:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x32, 0x0, 0x0) 14:37:28 executing program 5: syz_mount_image$udf(&(0x7f00000014c0), &(0x7f0000001500)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40), 0x0, &(0x7f0000001c00)={[{@shortad}]}) [ 272.098502][ T140] hid-generic 0000:0000:0000.0061: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:29 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:37:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$bt_BT_SNDMTU(r1, 0x29, 0x3a, 0x0, 0x7) [ 272.200838][ T3671] hid-generic 0000:0000:0000.0062: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x14, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000100)=0xa, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102382, 0x18fee}], 0x1, 0x0, 0x0, 0x1980}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xc63b9e35) 14:37:29 executing program 5: syz_mount_image$udf(&(0x7f00000014c0), &(0x7f0000001500)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40), 0x0, &(0x7f0000001c00)) 14:37:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) 14:37:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x351300, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x94, &(0x7f00000001c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x6c060000) unshare(0x20000000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x1, @rand_addr, 0x40}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x4}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3c6ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004106) ioctl$int_in(r3, 0x5421, &(0x7f0000000140)=0x7) splice(0xffffffffffffffff, &(0x7f0000000280)=0x100000000fff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x80000, 0x4) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000001440)=0x4, 0x4) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200002b2, 0x0) 14:37:29 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 14:37:29 executing program 5: getresuid(0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f00000014c0), &(0x7f0000001500)='./file0\x00', 0x43ff, 0x5, &(0x7f0000001b40)=[{0x0}, {&(0x7f0000001640)}, {0x0, 0x0, 0x400}, {&(0x7f0000001800)}, {0x0}], 0x40080, &(0x7f0000001c00)={[{@anchor}]}) [ 272.445989][T10890] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 272.543866][T10895] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:37:29 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:37:29 executing program 5: syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x200) 14:37:29 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x5, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85200000}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x98, &(0x7f00000002c0)=""/152, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:29 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000003c0), &(0x7f0000000440)=0x4) [ 272.970935][ T3707] hid-generic 0000:0000:0000.0063: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:29 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:37:29 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x808c0, 0x0) [ 273.064405][ T3707] hid-generic 0000:0000:0000.0064: hidraw1: HID v0.00 Device [syz1] on syz1 14:37:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x125d, r1) 14:37:30 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f00000062c0)=@file={0x1, './file1\x00'}, 0x6e) 14:37:30 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x600001, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:37:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000001480)) 14:37:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) write$evdev(r0, &(0x7f0000000080)=[{}], 0x18) 14:37:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x1) 14:37:30 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:37:30 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x15a1c1) 14:37:30 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x2, r1) 14:37:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000280)=""/162, 0x1000000, 0xa2, 0x1}, 0x20) 14:37:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5}, 0x48) 14:37:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000001280)={&(0x7f0000000080)=@in={0x2, 0x4e24, @remote}, 0x80, 0x0}, 0x4004810) 14:37:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000340)=[{0x6}]}) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 273.862425][ T1127] hid-generic 0000:0000:0000.0065: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:30 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create(0x80) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) 14:37:30 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0) 14:37:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/config\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) [ 273.930531][ T26] audit: type=1326 audit(1652711850.758:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10940 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9fd1c890e9 code=0x0 14:37:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 14:37:30 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$nfc_raw(r0, &(0x7f0000000000), 0x10) 14:37:31 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:37:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x8d5, 0x100002, 0x7, 0x0, 0x1}, 0x48) 14:37:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000740)='net/sockstat6\x00') read$usbfs(r0, 0x0, 0x54) 14:37:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) write$evdev(r0, 0x0, 0x18) 14:37:31 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0x6, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0) 14:37:31 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0x4, &(0x7f0000000380)=@framed={{}, [@ldst={0x0, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0xf8, &(0x7f0000000000)=""/248, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:31 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x3000) 14:37:31 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x410001, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, 0x0) 14:37:31 executing program 4: r0 = openat$autofs(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000000c0)=ANY=[@ANYBLOB="40000000000000ffff"]) [ 274.743489][ T140] hid-generic 0000:0000:0000.0066: hidraw0: HID v0.00 Device [syz1] on syz1 14:37:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000600)='r', 0x1}], 0x1}, 0x0) 14:37:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, 0x0, 0x0) 14:37:31 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) [ 274.792638][T10969] autofs4:pid:10969:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(64.4278190080), cmd(0xc018937e) [ 274.814942][T10969] autofs4:pid:10969:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) 14:37:32 executing program 5: getresuid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), 0xffffffffffffffff) sendto$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000740)='./file0\x00', 0x3e, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000780)="46d1636bc0f1bac5630625a7dc97010e53b9a9cc4bb489c73b9358ca4d27b66ac16cfd799ed8ce033ecd", 0x2a}], 0x0, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0x0, 0x3, &(0x7f0000001d40)=[{0x0}, {0x0}, {&(0x7f0000000d40)}], 0x0, &(0x7f0000001e00)={[{'802.15.4 MAC\x00'}, {}, {}], [{@euid_eq}, {@obj_role={'obj_role', 0x3d, ',:\\+'}}, {@hash}]}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001f00), 0xffffffffffffffff) 14:37:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r1, 0x213, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 14:37:32 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, 0x0) 14:37:32 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x8cd41, 0x0) 14:37:32 executing program 3: syz_clone(0x100080, &(0x7f0000002200)="e4", 0x1, 0x0, 0x0, 0x0) syz_clone3(0x0, 0x0) syz_clone(0x0, &(0x7f0000002200), 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000a00), 0x0) 14:37:32 executing program 1: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x80c00, 0x0) 14:37:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000100)="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", 0xfc43}, {&(0x7f0000000000)="b03d3a4a1500073a85dfe678c5c62b58fde3845ab004c8ab4c40dcba53debcd1f7050203615f8e5b694de0b3b355a4f9dedfe49ed7cf560580bb89bb8453d30517fc379628607beb48cd55d7a80dcd04950564c85c22bf11ee61d9a9948a512819f435fe8389a7e8130007be8fd9196679b81788931a505caab567ee8a1d10daad12d6ab58fb112ad1514f1e24b975b145b5da4d7a4496bbe4a5fe1674c09196a98f4b7f6d80236efffa8f113ee42ee7558957ec6b31f141cf4b8f4dbf2fff9fe1a8fe4d0bd43709102b720bfa06ec0574c225", 0xd3}, {&(0x7f0000000840)="751c3b2d9a9a52b3d42b7648dc9b6850f3dd0e3c2f900f6827b025d233c3d2b1f677ee925f00ba1ee57257b0be1e7d55ea8a75d4f3af772703f65a14c0fe0dd340bf8d91a38ebf681ccac66288313f05c82db50a9455c634cde6c6a5b1465d7b68907b0b7bcd3b21fce52c5cb58bda82aa9de560e43ddf6fc39d4cd8fc9c31223d11df1e6594cb3ac5b0337f2a579e3214b0407a78460ab89ec25ba9cb385b6af9467a5599536a17b5f968e60c859e1ebbc69cad81485fb7a28f0ec18795e0173814ff0d08eb0a59f24a9d4f09ec4ffa00c6", 0xd2}, {&(0x7f0000000940)="e24d3de15af2041318b23971a008b8c3d3e4a5d2a932fb1e6cf78f37a288b4d57120402ca2bc1e25219027c57c7cbb25", 0x30}, {&(0x7f0000000a80)="96a25a2184a1107652acfe0c4c624a83b28748ebe258efa25f8e311bdab493ca7d1da25197cdccd949e0c76b1ad043d42e23c7363a21456f325d92448f561f08f3c74795136b2b32e8adfd56e21c682f9ef5811c744f37fbd0ceb14cbd37c511a2f86eb2b7e4d0c2bda8242ebf92f7ed01bbc1093f06ddba24d26e78f522338c73a36384be27eb64235339072cb4c31a134bc8eb6a22400d2c3ae9499def84e6fef6d5ff7453477b8b2a81a29d889b8430e5ddf8ea549554569377c159251be918e02394936b8572fb00f2ad503b79a40aa80079406e0f28456ea5f43df08ed85f66ff92099c676348755fd0089287e389d2346ee29f46eab0ebbd8891077a58b79822bf4d68a0823d7d0c61c1a31a5f5e019ba09cda3b64e06962f874326ed022d1430e888fda37021730c0299b3c28aa9456b651a4d5b7e4a3d212096ada2f2428238d98c35228bd6f3fed36936a37bb2d39e89dcb2efe178e7fa789dd3ad5262d2d24a42924a81b11fb5309dc5ce7a2c9bdeb2f7209f714767c3f984646d51d7c123e5099c47abbd2b8364c7ea97ab09ab8d31fdfd1b33491e0cb196fe787a9eef1cd931833dfbfd91679106185a71da79d8e5d2a16e8b3b5755274b25984d01de9b63c0a26b4eea31252184a306e59bf900f50677f71845206d43ea77c14767e24905a4edf2b2c1cb4e3ba05712fc3d3657ee6d5b069e1f3b8d3ab8fb69880c22ff75fa8377145a77e801c48e055b41e7683b06a9d6ca70407a2291e5047f747c6fe34f7e3890def7af6d0c0b7522516f57f91aff8e0d335d3ea4b70f3ec1f0797d798a78985b0bc015b620a83403d333512b5d4f617955bd5393c5e9601d9154ebd8aae4281ab169acb09d361ed5d6e19107c94cc84364c2cd5089ca7da05451b54b8fb4c53d7dce2970fdb1b74f8e4b34d609608f6d84e16478c6b879c42f72fcb3f4b12ba6132e8c2e7829e857d2b0a661cca1303ae7025d4b1d673289f8c5954722decd390d8e434e56b9f5a40912629bd19c54a875c1b08754cd6a412bc444e373bcba2c5be5a338802c18f5f3f6a8eb29b5b0c65156551d33eeb6f2598d2d9d12e503c936296565c4614e67d5ebb1a4bf5fc8d04bd69d8a53732f935d8b30aef36dc986c99b158dda3c25aeff8c1076c431f29f7b2e4b8e65f9916b925a9fe1bf81240563305dc7dd2537dbf53757976df9139706d459262dc633ad960f3827b56573394a1bd96dd56bef40275b6eb98c51322eb0d0e0efe78a483bea07da19f56cbce9b670d567145c4526f5cfc6cf98eb230f6aaeeeb01e90b3f9c1c724c11b2bfc566173b4ddaf6a342c97be0cd976e492a48e0da71a02258c5b3aa4faf8f41732f15a9c32eb00dbe16f15d7788c77b24014a0d177c7b2b41bcd753cf77c28194801d3f9268871ec6863fca90642e09efff34a68a73a26f896b7d510dfea6e57a1be57b8f75b259e50916c3273004e71703f109b40a08b5cbe4046714f72571a9ea31170f8123d6a68cb9c6e704716fa861ea736df0005ab839d813881b554c6f4c45ab969fbd578e5dea1ea390d3cb62f4340e06b16c336bd440ef4ad522ae50d6e1efee61db4332185850e4a4ec18c2fe379c44e7b52e9db53bc873eae27c4e20126503dfcfb6cbc99ab31f0e5098379f046f5258c66531e35906339513821462edf70550f684294872d22e272107c955213c5178ac71f77d5818396a7bd9eff441e2ace4450110b534ccbacc435cc5aa7c427fcbca58e8c45b0cb2308314cffcdd2ca42758969f3aa18ba02f0dca776cce34861fd30ebb097e6e96cfaf41c350321d6872f541f5079788b729c9bae9288b0b4f404c268185967017995df1bba7dbd53e9976a7100c752a90d111eabc31474c1f84cef97bb948fd141f403d116e1f45a6f6f2c1e9177943a23ab6b159d462aafd69dda8c7b4f6bdf875be2307f656ca6462f7801ae932fc0995ca1e3b54944ac793990d3c68f00b5ad4dbc9b12f97e9f4228a78888daefdcfe02e02a546d2f71dea3e68cc85ee44b23b0763d88dd20a4cd02b1ae2f137ce80aa74a5bc84d03289682d59be03a96654a97e783b5ef7ded22fce6a65f9f20e04d1308ffcda0250f0aa5ce984ce55b16e5a230f2b61118998f1108faa57205879acbe3644c5a7cc18a51163d63c5613d8b1e1cc90dd840a826116775185845f3b2d3df86c0b310c8e09954d07a9b2e638476b3ce9fed24f3a004e0b3c72e30ef8df1581f205b5f352b9c4b764e75f45a25353a56ad970dab4a7a39480ba84d96143282f3c4614aab849657c2d67698641492031cd3e4ff120b0c2c3b2de771dedfc5cd527f9ff0bd56d18c2641f5147f42e0774096c6ca4ccea694099f62ed810cb43832a9ca305daf57c43b261a13619252c9d4eeaf26996db42cdc6b7a492d485066a580c9cd9bbb80497ee22e081a4a258c47c9d74be9365ab607116538e0a41c2407773fb3bc5885d6c20a1c266f9e64e7faf0f400630bf6028b31f8275c0bff25aaf2fd164e15f564273035e53ed8d2ed29831bcad1c0e2a3bac490e853bfab9ab21b11ad6822ed20ef4a99dbdc9b7062dedadeddef0d40aa5033b756db37ca431e66640511b045836cf987f963e7cf3e57ed0325a1baa5064f20673ff75af1eca12390df6fa88b65e9dff281aa91084eb806e637d1cae8b5b84c4f021b00a030959584a9f316dd64449484f8fb74bee177d03cf3da54b1528ceda4ae2190519c3a551b98c289ae4e4f9e2f343f7500855f14ae14afbcdb7665a2ca44371cfd78671b194efd273830a81bc759c0793a90e60aed7003cb2381e80211eea176ec1941910e73c522c72e8c86222ad62e50a73700f5df05d5001e6f9ce9e924628e9f3c682065ef06e282daea26334b0c823cbe782391d340c793834aad2defe6232ea57696446154a68e83e55af632eba72f50a1890ec0551993808e7b8a28ffa460307f0fddd884dbe8f7458ede4c7d68ccf92f8efd9422c94038eeff0f942fdb338aa259c4aff2c0d27a0481a4bb1577caea897438f58100007e3225e6448e709f0f6b27bf286b1fc920436ab28681b46ed082ba884a07f7813b62c56476fcdcce11d33f721f76903790f2d1fec356cab849d162b6e33cc2f659f7dbb54871f80459b06f499936149e4cec4b2e68c9101a4c4c1a2b5a0953736e9f9d963996469d1075fb9ac6e54759c3dd26913191ee3ca0185b4b427bb6c0cdef73a3278a669340f131437e5d993b3489a05b7b873c638deb8eb9c39323ceee5523438bab6327bd8835bf4d638a3685b142c76815627ae88cc27f7abc0abdaff91e4b9a4f0faea680554557563bdbadaca4db188dd79f61248f62d9de97671aef7cdaea3ba303bff645cd138986f0806ed43de8670d04c6a67d2b9592967b970afcd55456a029e60c26dc6be2a1ef5b181e0281c4f14f79ee3906bc69057ffce7aa35ea50d4d2d54487dc389f9b647ab36c295c462b24bb14f8d12cb47cef580832d949c5337bebdaa0c26f6e92acd65c89865650c0a00b4fe8311481ebdcda9bee563f0909a5bfd0e61d32277d9807e388891ae887ce6d4d69d5ef8837c437787b4821832e2891bba11dd4e0ca066efd13b328281fb5b7ff15d10049c40eedfecde76878ff938e973a8be10bd3dbdab5aee3ccb64c5932aaf8498a70f5724897aff43e542ea40bf70097a241ea8743c213e469fae646bf9c6f5b1a67649b788795d93da72d13f7818a6e69cc6172413122c7e77c78518be388291ddb2d1a3b3d8cc4240b95b28b5ceaee704c212a50f1f12fc0fb85f0cb7f0af7317576326dc6923702363521ce79bc119b88420cc58bc5f6a3531dce0254322c0f01dfc44379c2f0493779b5c714d9a8c3ed96f6e3e9acfdfeb1801e055013a6436f6f00defc42ce04c6ffc01b32ff009c344b1c20355e74e7f377ea286a59302539a8a90add580f75e7b699919cbf894c8fcfd8c719674e9efc3b67f9f472845a97d7240e4ab26c25103c79661738bf1724e810eb292d36b078933bef98b28485448f326b684be88a13435ccf3e45cf3ec1cab95f7f28d1861c90cecc674243035912b866c7754b7ed08e2747f0efdda8b392a92518e311506a0abaff864b5e019d8b5fd76484ae635aa425d9c1a2d58ca811b2db8df4f4d986768e4f4ddc659a7af9c1136f3d9b6ed0aa3c8120b4625d6d4113df12a1bac4d9d596464ddc95e032ef6cec3266a0225666ddc4482145a595f2603317b7ab67563c406c44306f4b6a692df1d0bf01549eeb762a2c3c7f88f55eba28ecfed492f60669ae4449ab79a1a447f3ca7b38c5bcc64d2eb04691cfb09e236c7706b455a10c61ae9a7ddc3dc97f27d0f9f2b103c26827429ac6d1f2ed34ad7087c108cce5c047b95e485d3102f1c2acc98f6c3fba2e430cc5b5f4ac02ec8715e3f156c101d1b09a3904355766860231dab75a54b435228a6d851723cd6f71a58a7a9d739e8636165dd1f0276cb270a7e3004b8a400d89422a023c69d569660586585154bfa3d6c0d21b2d46722a6a5a7b722348f83a82854fd57eb785023d933753a796451769c8e07bdec9b208b9ab64ebef51e1fddd27c0bc465251b520ae0efa4e2c9aa7e2b14c613f20d2a03dadcfdbdbb70d18c79d5722b0ab6c94ca2ff2f0800cda9fb6f535236de4ff27cc80cb23f10ac817c4d36a65d533cbae69c3b9b11e9bd38ad89160dc4593af84e1ad2f674febdf66d376783341c9c4b063018de7e16293e06d7756311a4161fe1399c355c5cfbcb5eb7ab86ee4818c1f1207fb4e676fa7a456b", 0xd46}], 0x5}, 0x4000004) 14:37:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0x80045105, &(0x7f0000000040)) 14:37:32 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 14:37:32 executing program 0: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) 14:37:32 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000001280)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}, {&(0x7f0000001140)="bb", 0x1}], 0x3}, 0x0) 14:37:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000200)) 14:37:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0x80045105, &(0x7f0000000040)) 14:37:32 executing program 0: syz_mount_image$ntfs3(&(0x7f0000004e00), &(0x7f0000004e40)='./file0\x00', 0x0, 0x0, &(0x7f0000005f80), 0x800, &(0x7f00000060c0)={[{@sparse}], [{@obj_type={'obj_type', 0x3d, 'euid<'}}]}) 14:37:32 executing program 3: memfd_create(&(0x7f00000001c0)='/dev/nvram\x00', 0x0) 14:37:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) 14:37:32 executing program 2: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)) 14:37:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB]) 14:37:32 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='smaps\x00') 14:37:32 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000000080)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:32 executing program 1: getresuid(&(0x7f0000000080), 0x0, 0x0) 14:37:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)="e4c4160fd5f32a5cfac583ee8fd6af808e471fad1d937f498707d8cfb10806a99869de766556", 0x26}], 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01bade000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba512e4080211000001505050505050"], 0x448}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x11, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) 14:37:32 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:32 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x2c502, 0x0) 14:37:32 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000015c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) [ 275.858339][T11019] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 14:37:32 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x9}, 0x0, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 14:37:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty}}) 14:37:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000040)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000880)=[@rights, @cred], 0x78}, 0x0) 14:37:32 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:32 executing program 1: socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) mlockall(0x3) [ 276.008274][T11038] binder: 11034:11038 ioctl 400c620e 0 returned -14 [ 276.018635][ T26] audit: type=1804 audit(1652711852.838:5): pid=11036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2692422107/syzkaller.sAxMJq/626/cgroup.controllers" dev="sda1" ino=1175 res=1 errno=0 14:37:32 executing program 4: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x894c, 0x0) 14:37:32 executing program 2: sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) 14:37:32 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000001580)={&(0x7f0000000200)=@ethernet={0xa, @remote}, 0x80, 0x0}, 0xe803) 14:37:33 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip6_flowlabel\x00') read$watch_queue(r0, 0x0, 0x0) 14:37:33 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 14:37:33 executing program 5: connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:33 executing program 2: sendto$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:33 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fuse', 0x0, 0x0) r1 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 14:37:33 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000080)=""/119, 0x77) 14:37:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@loopback}) 14:37:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 14:37:33 executing program 5: connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:33 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)={0x7d}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x80000000]}, 0x8}) 14:37:33 executing program 0: keyctl$restrict_keyring(0x5, 0xfffffffffffffffd, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, r0) 14:37:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), r0) 14:37:33 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001200)=[{&(0x7f00000000c0)='I', 0x1}, {&(0x7f0000001480)="ff56", 0x2, 0x7fffffffffffffff}], 0x0, 0x0) 14:37:33 executing program 4: msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 14:37:33 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xd7e) 14:37:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x1, 0x5, 0x1df, 0x0, 0x1}, 0x48) 14:37:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) 14:37:33 executing program 5: connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:33 executing program 1: syz_usb_connect$uac1(0x0, 0x81, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6f, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@extension_unit={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 14:37:33 executing program 3: syz_emit_ethernet(0x4e, &(0x7f00000003c0)={@broadcast, @remote, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "426ae8", 0x18, 0x6, 0x0, @private0, @dev={0xfe, 0x80, '\x00', 0x38}, {[], @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}, 0x0) 14:37:33 executing program 4: mkdir(&(0x7f0000001440)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x3) 14:37:33 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:33 executing program 2: syz_clone(0x68025000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:33 executing program 4: syz_emit_ethernet(0x38, &(0x7f00000003c0)={@random="65de58692b7d", @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d8040c", 0x2, 0x2b, 0x0, @private1, @private2, {[], 'No'}}}}}, 0x0) 14:37:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0x0) 14:37:33 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) [ 277.088252][ T14] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 277.329340][ T14] usb 2-1: Using ep0 maxpacket: 32 [ 277.448257][ T14] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 277.459314][ T14] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 14:37:34 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) write$ppp(r0, &(0x7f0000001100)="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", 0x1000) 14:37:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @private=0xa010102}, 0x10) 14:37:34 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 14:37:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0x0) [ 277.628323][ T14] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 277.651470][ T14] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 277.675181][ T14] usb 2-1: Product: syz [ 277.685511][ T14] usb 2-1: Manufacturer: syz [ 277.690534][ T14] usb 2-1: SerialNumber: syz [ 278.008331][ T14] usb 2-1: 0:2 : does not exist [ 278.025183][ T14] usb 2-1: USB disconnect, device number 18 14:37:35 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 14:37:35 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000180), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6465636f6d706f73652c63726561746f723d838798182c7569643d"]) 14:37:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000380)='./file0\x00', 0xffff1f0000000000, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)) 14:37:35 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000880)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/net\x00') 14:37:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)=@newlinkprop={0x20, 0x30, 0xe221}, 0x20}}, 0x0) 14:37:35 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, 0x0, 0x0) 14:37:35 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, 0x0, 0x0) 14:37:35 executing program 0: fanotify_mark(0xffffffffffffffff, 0x0, 0xe2fd4719604053ef, 0xffffffffffffffff, 0x0) 14:37:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x240818d4, &(0x7f0000001100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 14:37:35 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001640)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x220, 0xffffffff, 0xffffffff, 0x220, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}, {{@ip={@dev, @private, 0x0, 0x0, 'tunl0\x00', 'ipvlan0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) [ 278.456049][T11124] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:35 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000040)={0xec4, 0x453, 0x0, 0x0, 0x0, "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"}, 0xec4}}, 0x0) 14:37:35 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, 0x0, 0x0) 14:37:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 278.568029][ T26] audit: type=1107 audit(1652711855.388:6): pid=11135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='' 14:37:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs, 0x94) 14:37:36 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000000)={0x1, @le_start_enc={{0x2019, 0x1c}, {0x0, 0x0, 0x0, "f56508feea18abfad3a55b788938345a"}}}, 0x20) 14:37:36 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 14:37:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001a40)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, &(0x7f0000001a80)={0x0, r2+60000000}) 14:37:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x34008881, 0x0, 0x0) 14:37:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 14:37:36 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000380)=ANY=[]) 14:37:36 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)={[{@gid}]}) 14:37:36 executing program 1: uname(&(0x7f0000000040)=""/174) 14:37:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6465636f6d706f73652c63726561746f723d83"]) 14:37:36 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$tcp_congestion(r0, &(0x7f00000002c0)='highspeed\x00', 0xa) 14:37:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={0x0}, 0x1, 0x0, 0x6800}, 0x0) 14:37:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000440)={'HL\x00'}, &(0x7f0000000480)=0x1e) 14:37:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@abs, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000005d40)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{0x0, 0x0, &(0x7f0000001ac0)}}], 0x2, 0x10002, &(0x7f0000005f00)={0x0, 0x3938700}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x803e, 0x0, 0x0, 0x0) 14:37:36 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x11e340, 0x0) 14:37:36 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @remote, 'vlan0\x00'}}, 0x1e) 14:37:36 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000a50000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 5: openat$sw_sync(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) 14:37:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) write$ppp(r0, 0x0, 0x0) 14:37:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000002d68c5"], 0x14}}, 0x0) 14:37:36 executing program 4: fanotify_init(0x28, 0x0) 14:37:36 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x180c0, 0x0) 14:37:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="60000000020601040000000000000000000000090900020073797a0000000000050001"], 0x60}}, 0x0) 14:37:36 executing program 0: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 14:37:36 executing program 1: mprotect(&(0x7f0000fe9000/0x14000)=nil, 0x14000, 0x0) 14:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="60000000020601"], 0x60}}, 0x0) 14:37:36 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000720000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x7b02, 0x1ff}, 0x48) [ 279.630986][T11195] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. 14:37:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x38, 0x1, 0x1, 0x3, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x38}}, 0x0) 14:37:36 executing program 2: mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/44) 14:37:36 executing program 5: r0 = shmget$private(0x0, 0x800000, 0x0, &(0x7f0000800000/0x800000)=nil) shmctl$SHM_LOCK(r0, 0xb) 14:37:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x601, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) [ 279.677894][T11201] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 14:37:36 executing program 5: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 14:37:36 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000a40000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000150000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 14:37:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0xffffffff}, 0x48) 14:37:36 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001dffffff8500ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x4) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:37:36 executing program 4: syz_io_uring_setup(0x187, &(0x7f0000000240), &(0x7f00006d5000/0x2000)=nil, &(0x7f000072b000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f00006d5000/0x1000)=nil, 0x1000, 0x9) 14:37:36 executing program 0: set_mempolicy(0x1, &(0x7f0000000080)=0xfffffffffffffffb, 0xafa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000410e) 14:37:36 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001dffffff8500ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="60000000100001040000000000000000000000090900020073797a0000000000090001"], 0x60}}, 0x0) 14:37:36 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000004c0000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x34, 0xb, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x2}]}]}, 0x34}}, 0x0) 14:37:36 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000dc872, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:37:36 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8001, &(0x7f0000000140)=0x4, 0x7, 0x0) 14:37:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0x17, &(0x7f0000000180)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4f0, 0x0, 0x3d0, 0x0, 0x0, 0xec, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @local, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0xa4, 0xc8}, @common=@unspec=@STANDARD={0x24}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv6=@private2, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa4, 0xe8}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @remote}, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x54c) 14:37:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="a4000000000801020000000000000000020000030900010073797a300000000005000300b5000000060002"], 0xa4}}, 0x0) [ 280.035816][T11237] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 14:37:36 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085ffffff0000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085ffffffaa00000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 280.035839][T11237] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 280.111080][T11247] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2c, 0x9, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0) 14:37:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 14:37:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xc, 0x0, 0x4, 0x0, 0x5}, 0x48) 14:37:37 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000970000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 14:37:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000380)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)) 14:37:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x4, 0x1ff}, 0x48) 14:37:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) execveat(r2, &(0x7f00000004c0)='./bus/file0\x00', 0x0, &(0x7f0000000600), 0x400) lseek(r2, 0x200, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x10000) 14:37:37 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000af0000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x8002, 0x1ff}, 0x48) 14:37:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x3e00, 0x1ff}, 0x48) 14:37:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xf, 0x4, 0x4, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a}, 0x48) 14:37:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x7a03, 0x1ff}, 0x48) 14:37:37 executing program 5: move_pages(0x0, 0x3, &(0x7f0000000080)=[&(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil], 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) [ 280.446986][ T26] audit: type=1804 audit(1652711857.268:7): pid=11269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir845208849/syzkaller.NS39UA/591/bus" dev="sda1" ino=1166 res=1 errno=0 14:37:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:37:37 executing program 3: set_mempolicy(0x1, &(0x7f0000000080)=0xfffffffffffffffb, 0xafa) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/vlan/vlan0\x00') 14:37:37 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000400000000000000000000001d0000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 280.544676][ T26] audit: type=1800 audit(1652711857.308:8): pid=11269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1166 res=0 errno=0 14:37:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 14:37:37 executing program 3: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 14:37:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) execveat(r2, &(0x7f00000004c0)='./bus/file0\x00', 0x0, &(0x7f0000000600), 0x400) lseek(r2, 0x200, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x10000) 14:37:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xc, 0x4, 0x4, 0x1ff}, 0x48) 14:37:37 executing program 5: socketpair(0x11, 0x2, 0x300, &(0x7f0000000000)) 14:37:37 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001d0000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x3e00, 0x1ff}, 0x48) 14:37:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)=ANY=[]) [ 281.171316][ T26] audit: type=1804 audit(1652711857.998:9): pid=11303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir845208849/syzkaller.NS39UA/592/bus" dev="sda1" ino=1177 res=1 errno=0 14:37:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) execveat(r2, &(0x7f00000004c0)='./bus/file0\x00', 0x0, &(0x7f0000000600), 0x400) lseek(r2, 0x200, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x10000) 14:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x2c, 0x1, 0x1, 0x3, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @empty}}}]}]}, 0x2c}}, 0x0) 14:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) [ 281.251648][ T26] audit: type=1800 audit(1652711858.048:10): pid=11303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1177 res=0 errno=0 14:37:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 1: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @loopback={0x0, 0x460c6}}}) [ 281.353232][ T26] audit: type=1804 audit(1652711858.178:11): pid=11318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir845208849/syzkaller.NS39UA/593/bus" dev="sda1" ino=1165 res=1 errno=0 [ 281.415382][ T26] audit: type=1800 audit(1652711858.178:12): pid=11318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1165 res=0 errno=0 14:37:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000001a000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x2, &(0x7f0000000140)=@raw=[@generic={0x7, 0xe, 0xc, 0x58d6, 0x9}, @generic={0x0, 0x5, 0x6, 0x0, 0x80000000}], &(0x7f0000000180)='GPL\x00', 0x6, 0xcb, &(0x7f0000000280)=""/203, 0x41100, 0x19, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0xf, 0x1}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) mount$9p_fd(0x0, &(0x7f0000001840)='./bus\x00', &(0x7f00000021c0), 0x40080, &(0x7f0000002200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,msize=0x0000000080000000,access=', @ANYRESDEC=0xee01, @ANYBLOB]) sendfile(r2, r3, 0x0, 0x10000) 14:37:38 executing program 5: syz_io_uring_setup(0x187, &(0x7f0000000240), &(0x7f00006d5000/0x2000)=nil, &(0x7f000072b000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f00006d5000/0x1000)=nil, 0x1000, 0x3) 14:37:38 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 1: prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x1000)=nil) 14:37:38 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) [ 281.687539][ T26] audit: type=1804 audit(1652711858.508:13): pid=11340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2692422107/syzkaller.sAxMJq/645/bus" dev="sda1" ino=1157 res=1 errno=0 [ 281.714907][ T26] audit: type=1800 audit(1652711858.538:14): pid=11340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=1157 res=0 errno=0 14:37:38 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:38 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000150000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:38 executing program 2: msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 14:37:38 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x1eec}, 0x1c) 14:37:38 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xf, 0x4, 0x4, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xf000000}, 0x48) 14:37:39 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001d0000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:39 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x20000000de832, 0xffffffffffffffff, 0x0) 14:37:39 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000630000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:37:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000340)=[&(0x7f0000000200)='*|{\x00', 0x0, &(0x7f00000002c0)=',-(\x00', &(0x7f0000000300)='\x00'], 0x0) 14:37:39 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2) ioctl$VIDIOC_S_MODULATOR(r0, 0x400448c9, &(0x7f0000000140)={0x0, "556c3707d0f0392a238d9463351b76de79603d659131bea0dd8f236e62a95e38"}) 14:37:39 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 1: sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000500000b000000004400000008000300", @ANYRES32=0x0, @ANYBLOB="0c003000050008"], 0x28}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000300)="5cdd3086ddffff6633c9bbac88a8eb3a8dbc8e261f1fc2ba55136998db5b88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:37:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x15) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000540)) 14:37:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x4b2f, 0x0) 14:37:39 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x2}, 'port0\x00'}) 14:37:39 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x0, 0x7fff}) 14:37:39 executing program 2: setpriority(0x0, 0x0, 0x9) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 14:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:37:39 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)) 14:37:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:37:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000002580)=ANY=[], 0x16) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fff) 14:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:37:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x15) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000540)) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:37:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:37:40 executing program 2: setpriority(0x0, 0x0, 0x9) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 14:37:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000440)={0x0, 0x0}) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:37:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:37:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x15) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000540)) 14:37:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:37:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000440)={0x0, 0x0}) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:37:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:37:40 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001480)={[{}]}) 14:37:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000440)={0x0, 0x0}) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) 14:37:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000440)={0x0, 0x0}) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) 14:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:37:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:37:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c) 14:37:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x80047213, 0x0) 14:37:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:41 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "cf8359a40fde23c3db95170f56d33a68c994ea978dfcd8820400000000000000cc86ccc1127e514023d99b1f57d097bc582e79ce319d312bfd00"}, 0x48, 0xfffffffffffffffd) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x0) 14:37:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, r1) 14:37:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x541b, 0x0) 14:37:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:37:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/10, 0xa}], 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 14:37:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 14:37:42 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000200)) socket$alg(0x26, 0x5, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x700, 0x0}}], 0x600, 0x0, 0x0) 14:37:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:37:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, r1) 14:37:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 14:37:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:37:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, r1) 14:37:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}]}]}, 0x54}}, 0x0) 14:37:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 14:37:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 14:37:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, r1) 14:37:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}]}]}, 0x54}}, 0x0) 14:37:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:37:43 executing program 1: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:37:43 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000140)={@initdev}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x141842, 0x0) write(r1, &(0x7f0000004200)="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", 0xffe00) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ftruncate(r1, 0x0) pivot_root(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 14:37:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x2}]}]}, 0x54}}, 0x0) 14:37:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) 14:37:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:37:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) 14:37:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) 14:37:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000140)={@initdev}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x141842, 0x0) write(r1, &(0x7f0000004200)="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", 0xffe00) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ftruncate(r1, 0x0) pivot_root(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 14:37:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) add_key(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ptrace(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 14:37:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(0xffffffffffffffff, r0) 14:37:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(0xffffffffffffffff, r0) 14:37:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:37:44 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(0xffffffffffffffff, r0) 14:37:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0xe0c81) dup2(r0, r1) 14:37:44 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpriority(0x0, 0x0, 0x9) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 14:37:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)) 14:37:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0xe0c81) dup2(r0, r1) 14:37:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0xe0c81) dup2(r0, r1) 14:37:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) 14:37:45 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) [ 288.280222][T11583] sp0: Synchronizing with TNC 14:37:45 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpriority(0x0, 0x0, 0x9) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 14:37:45 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) dup2(r0, r1) 14:37:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) 14:37:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:45 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) dup2(r0, r1) 14:37:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) [ 289.186592][T11602] sp0: Synchronizing with TNC 14:37:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:37:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:37:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) dup2(r0, r1) 14:37:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:46 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:46 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 14:37:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:37:46 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:46 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(0xffffffffffffffff, r0) 14:37:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:37:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:46 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x17, 0x0, 0x0}) 14:37:46 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) [ 290.468262][ T3671] usb 6-1: new high-speed USB device number 17 using dummy_hcd 14:37:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:37:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:47 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(0xffffffffffffffff, r0) 14:37:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:37:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:37:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:47 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(0xffffffffffffffff, r0) 14:37:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:37:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) [ 291.048460][ T3671] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 291.073507][ T3671] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 291.085444][ T3671] usb 6-1: Product: syz [ 291.100582][ T3671] usb 6-1: Manufacturer: syz [ 291.106956][ T3671] usb 6-1: SerialNumber: syz [ 291.204208][ T3671] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 291.878347][ T3671] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 292.328316][ C1] usb 6-1: ath: unknown panic pattern! [ 292.513456][ T140] usb 6-1: USB disconnect, device number 17 [ 292.898339][ T3671] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 292.906488][ T3671] ath9k_htc: Failed to initialize the device [ 292.918262][ T140] usb 6-1: ath9k_htc: USB layer deinitialized 14:37:49 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, 0xffffffffffffffff) 14:37:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x17, 0x0, 0x0}) 14:37:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:37:49 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000200)) socket$alg(0x26, 0x5, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 14:37:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, 0xffffffffffffffff) 14:37:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x17, 0x0, 0x0}) 14:37:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:37:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) dup2(r0, 0xffffffffffffffff) 14:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) [ 293.468364][ T140] usb 6-1: new high-speed USB device number 18 using dummy_hcd [ 294.009134][ T140] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 294.018625][ T140] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 294.026631][ T140] usb 6-1: Product: syz [ 294.030851][ T140] usb 6-1: Manufacturer: syz [ 294.035459][ T140] usb 6-1: SerialNumber: syz [ 294.080209][ T140] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 294.728366][ T140] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 295.168261][ C1] usb 6-1: ath: unknown panic pattern! [ 295.352307][ T3671] usb 6-1: USB disconnect, device number 18 [ 295.778180][ T140] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 295.785682][ T140] ath9k_htc: Failed to initialize the device [ 295.792104][ T3671] usb 6-1: ath9k_htc: USB layer deinitialized 14:37:52 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:37:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x17, 0x0, 0x0}) 14:37:52 executing program 2: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000}, 0x1c) 14:37:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:37:52 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141440080002007f0020010c00028005000100000000001c002280080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000002000080007"], 0x80}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x3, 0x4) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xfffffecc) socket$bt_rfcomm(0x1f, 0x0, 0x3) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:37:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000003c0)={0x18, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 14:37:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x0, 0x0, 0x0}) 14:37:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:37:52 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)='\x00', 0x1) 14:37:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x0, 0x0, 0x0}) 14:37:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) [ 296.298273][ T3671] usb 6-1: new high-speed USB device number 19 using dummy_hcd [ 296.858376][ T3671] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 296.867704][ T3671] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 296.876233][ T3671] usb 6-1: Product: syz [ 296.880481][ T3671] usb 6-1: Manufacturer: syz [ 296.885090][ T3671] usb 6-1: SerialNumber: syz [ 296.928760][ T3671] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 297.498273][ T3671] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 297.938276][ C1] usb 6-1: ath: unknown panic pattern! [ 298.124644][ T22] usb 6-1: USB disconnect, device number 19 14:37:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x18, 0x0, 0x0, 0x0}) 14:37:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:37:55 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0xee00}}]}, 0x28}}, 0x0) 14:37:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000003c0)={0x18, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 14:37:55 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141440080002007f0020010c00028005000100000000001c002280080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000002000080007"], 0x80}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x3, 0x4) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xfffffecc) socket$bt_rfcomm(0x1f, 0x0, 0x3) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) [ 298.578525][ T3671] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 298.585537][ T3671] ath9k_htc: Failed to initialize the device [ 298.594326][ T22] usb 6-1: ath9k_htc: USB layer deinitialized 14:37:55 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141440080002007f0020010c00028005000100000000001c002280080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000002000080007"], 0x80}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x3, 0x4) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xfffffecc) socket$bt_rfcomm(0x1f, 0x0, 0x3) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:37:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:37:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newlink={0x34, 0x6c, 0x705, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'lo\x00'}]}, 0x34}}, 0x0) 14:37:55 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 14:37:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:37:55 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:55 executing program 3: syz_clone3(&(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:37:55 executing program 4: getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) [ 299.098227][ T22] usb 6-1: new high-speed USB device number 20 using dummy_hcd [ 299.658343][ T22] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 299.667532][ T22] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 299.676117][ T22] usb 6-1: Product: syz [ 299.680626][ T22] usb 6-1: Manufacturer: syz [ 299.685273][ T22] usb 6-1: SerialNumber: syz [ 299.739392][ T22] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 300.378306][ T3749] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 300.828258][ C1] usb 6-1: ath: unknown panic pattern! [ 301.015584][ T22] usb 6-1: USB disconnect, device number 20 [ 301.458268][ T3749] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 301.465339][ T3749] ath9k_htc: Failed to initialize the device [ 301.471735][ T22] usb 6-1: ath9k_htc: USB layer deinitialized 14:37:58 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) 14:37:58 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000004c0)) 14:37:58 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000800), 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000840)) 14:37:58 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$smc(&(0x7f0000000140), 0xffffffffffffffff) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:37:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004380)={0x11, 0x4, &(0x7f00000041c0)=@framed={{}, [@jmp]}, &(0x7f0000004200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000042c0), 0x8, 0x10, 0x0}, 0x80) 14:37:58 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), 0xffffffffffffffff) 14:37:58 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop0', 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 14:37:58 executing program 4: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000c40), 0x240, 0x0) 14:37:58 executing program 0: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 14:37:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 14:37:58 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') 14:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x29, 0x0, &(0x7f0000000040)) [ 301.958342][ T22] usb 6-1: new high-speed USB device number 21 using dummy_hcd [ 302.569934][ T22] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 302.579288][ T22] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 302.587411][ T22] usb 6-1: Product: syz [ 302.592372][ T22] usb 6-1: Manufacturer: syz [ 302.597036][ T22] usb 6-1: SerialNumber: syz [ 302.659078][ T22] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 303.288364][ T22] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 303.711908][ T3712] usb 6-1: USB disconnect, device number 21 14:38:01 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) 14:38:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000080)) 14:38:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x2a, 0x0, &(0x7f0000000040)) 14:38:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000640)='ext2\x00', &(0x7f0000000680)='./file1\x00', 0x7, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000e00)) 14:38:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x348, 0xffffffff, 0x218, 0x218, 0x160, 0xffffffff, 0xffffffff, 0x2b0, 0x2b0, 0x2b0, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'erspan0\x00', 'syz_tun\x00'}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@inet=@iprange={{0x68}, {@ipv4=@loopback, @ipv4=@loopback, @ipv6=@mcast1, @ipv4=@multicast1}}, @common=@icmp={{0x28}, {0x0, 'u_'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}, 0x8}}}, {{@uncond, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @private, 0x0, 0x0, 'sit0\x00', 'team0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a8) 14:38:01 executing program 2: syz_mount_image$fuse(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x344c1, &(0x7f0000000880)) 14:38:01 executing program 4: inotify_init1(0xc7a4c217e1363e5b) 14:38:01 executing program 1: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 14:38:01 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/block/loop0', 0x1, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x2b}, 0x18) 14:38:01 executing program 0: r0 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x0, 0x49a]) [ 304.237481][T11782] x_tables: duplicate underflow at hook 2 14:38:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000900)='loginuid\x00') write$tun(r0, 0x0, 0x0) 14:38:01 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x1ff, 0x0) read$FUSE(r0, &(0x7f0000000880)={0x2020}, 0x2020) [ 304.338608][ T22] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 304.345633][ T22] ath9k_htc: Failed to initialize the device [ 304.404017][ T3712] usb 6-1: ath9k_htc: USB layer deinitialized [ 304.778350][ T3712] usb 6-1: new high-speed USB device number 22 using dummy_hcd [ 305.310307][ T3712] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 305.319814][ T3712] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 305.327826][ T3712] usb 6-1: Product: syz [ 305.332156][ T3712] usb 6-1: Manufacturer: syz [ 305.336763][ T3712] usb 6-1: SerialNumber: syz [ 305.379681][ T3712] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 305.948387][ T14] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 306.371098][ T1127] usb 6-1: USB disconnect, device number 22 14:38:03 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x80, &(0x7f00000007c0)={[{0x7b, 0x4e00, "0ace16877be6eb17310f79e7c3170a58c6620cfed1301d59da931056b9b76afe13691bf5c68ed9d4701b9f99e49ca6f263c2cdf991b1d51072a8489f1c62bd8aba21ba360df2e1964cbc702ffcfad63911043ff5d6c3b70694383198dce590b57523fe25db45a0aa1bf54ddb851e2e132d053e91aae034f4510062"}]}) 14:38:03 executing program 1: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 14:38:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd9, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, 0x0) 14:38:03 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c84df35c14069bd32afa091f2d16733c177af81995ec86654424d1a636153360aa2491e20f6c4a3e7608dfa4e74ca4b40bc6f647cabe55357debcc07fcd6a49c", "52d29cb2b99618d3a02878a6659c8023e83306ee43a6ed993385a0551ea92c0866cf1a43a05762347e1ebb30b625ee2e2225df31f5484d7a4d50e4014ade5d8b", "025569760c3d3a54f6e608695daa642512d354cc61eeb75839a89bf40776bd7e"}) 14:38:03 executing program 0: syz_open_dev$vcsu(&(0x7f00000001c0), 0x0, 0x20702) 14:38:03 executing program 3: pipe(&(0x7f0000000940)={0xffffffffffffffff}) connect(r0, 0x0, 0x0) 14:38:03 executing program 4: utimensat(0xffffffffffffffff, 0x0, 0x0, 0x100b957854e81b54) 14:38:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r2, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 14:38:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00'}) 14:38:03 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) getdents(r0, &(0x7f00000001c0)=""/55, 0x37) 14:38:03 executing program 4: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000640)='ext2\x00', &(0x7f0000000680)='./file1\x00', 0x7, 0x3, &(0x7f0000000b00)=[{&(0x7f00000006c0)="b32fb1d3af1c2cc8f50e9cf6326bda86f58d73ba550c5c0f44a322538a3e9303db1a744121053dd12fd488434a0b2024629ce419a911c6aad8336cd68c2c5efd013e7b1700fb66c78367ff1fe593f3", 0x4f, 0x1}, {&(0x7f0000000780), 0x0, 0x7}, {&(0x7f0000000880)='e', 0x1, 0xffff}], 0x0, &(0x7f0000000e00)={[{@data_journal}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x101}}, {@acl}, {@noload}, {@noload}, {@nogrpid}], [{@uid_gt}, {@uid_lt}, {@pcr={'pcr', 0x3d, 0x12}}, {@measure}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, 'uid'}}, {@uid_gt}, {@uid_lt}, {@euid_gt}]}) [ 306.978967][ T14] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 306.989651][ T14] ath9k_htc: Failed to initialize the device [ 307.019781][ T1127] usb 6-1: ath9k_htc: USB layer deinitialized [ 307.040948][T11823] loop4: detected capacity change from 0 to 255 [ 307.059658][T11823] ext2: Unknown parameter 'uid>00000000000000000000' [ 307.388207][ T1127] usb 6-1: new high-speed USB device number 23 using dummy_hcd [ 307.908386][ T1127] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 307.917470][ T1127] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 307.925651][ T1127] usb 6-1: Product: syz [ 307.929894][ T1127] usb 6-1: Manufacturer: syz [ 307.935010][ T1127] usb 6-1: SerialNumber: syz [ 307.978958][ T1127] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 308.548427][ T1127] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 308.970110][ T3749] usb 6-1: USB disconnect, device number 23 14:38:06 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:06 executing program 0: r0 = socket$kcm(0xa, 0x1, 0x106) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x31, &(0x7f0000000080), 0x4) 14:38:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x1, &(0x7f00000014c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x2000}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:38:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001a00)=@base={0x9}, 0x48) 14:38:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0xd}, 0x48) 14:38:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001a00)=@base={0x9, 0x525, 0x0, 0xa931}, 0x48) 14:38:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0xc, 0x56, 0x6, 0x1}, {0x5, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x5}]}) 14:38:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:06 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x27, &(0x7f0000000000), 0x4) [ 309.577426][ T26] audit: type=1326 audit(1652711886.398:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11845 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f30b96890e9 code=0x0 [ 309.621045][ T1127] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 309.642605][ T1127] ath9k_htc: Failed to initialize the device [ 309.650036][ T3749] usb 6-1: ath9k_htc: USB layer deinitialized [ 310.028261][ T3749] usb 6-1: new high-speed USB device number 24 using dummy_hcd [ 310.618384][ T3749] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 310.627619][ T3749] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 310.636244][ T3749] usb 6-1: Product: syz [ 310.640734][ T3749] usb 6-1: Manufacturer: syz [ 310.645341][ T3749] usb 6-1: SerialNumber: syz [ 310.688942][ T3749] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 311.298410][ T3749] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 311.518215][ C1] usb 6-1: ath: unknown panic pattern! [ 311.704180][ T1127] usb 6-1: USB disconnect, device number 24 14:38:09 executing program 5: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:09 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f00000006c0)={0x20080522, r0}, &(0x7f0000000740)) 14:38:09 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x10, &(0x7f0000000000), 0x4) 14:38:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 14:38:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:09 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2b, &(0x7f0000000000), 0x4) 14:38:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000e150000000000ff0095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:38:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:09 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGRS485(r0, 0x542e, 0x0) 14:38:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x19f, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 14:38:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) [ 312.338221][ T3749] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 312.347319][ T3749] ath9k_htc: Failed to initialize the device [ 312.380088][ T1127] usb 6-1: ath9k_htc: USB layer deinitialized 14:38:09 executing program 5: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:09 executing program 0: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000005780)=[{&(0x7f00000056c0)="ee", 0x1}], 0x0, 0x0) 14:38:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:09 executing program 4: mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) clock_getres(0x6, &(0x7f0000000080)) 14:38:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000540)=""/187, 0x32, 0xbb, 0x1}, 0x20) 14:38:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='ns\x00') timerfd_gettime(r0, 0x0) 14:38:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) 14:38:09 executing program 3: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000100)) 14:38:09 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:09 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x81}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 14:38:10 executing program 5: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) 14:38:10 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x9, 0x101801) write$evdev(r0, &(0x7f00000002c0)=[{}], 0x18) 14:38:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x1000000}]}}, &(0x7f0000000540)=""/196, 0x26, 0xc4, 0x1}, 0x20) 14:38:10 executing program 0: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r1 = openat$vga_arbiter(0xffffff9c, 0x0, 0x5ae8305ff62ee0b7, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000440)=[r1], 0x1) syz_io_uring_setup(0x6f6f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x358}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040), &(0x7f0000000100)) 14:38:10 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:10 executing program 0: request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0) 14:38:10 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000400240001801400018008000100b4141400080002007f0020010c00028005000100000000001c001080080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:38:10 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_io_uring_setup(0x6d1, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r1 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000400), 0x5ae8305ff62ee0b7, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000440)=[r1], 0x1) 14:38:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002440)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@dstopts_2292={{0x24, 0x29, 0x4, {0x0, 0x1, '\x00', [@calipso={0x7, 0x8}]}}}], 0x24}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 14:38:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:10 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) 14:38:10 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c09, 0x0) 14:38:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 14:38:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:11 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@fat=@gid={'gid', 0x3d, 0xee00}}]}) 14:38:11 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0xc06012e6, &(0x7f0000000040)) 14:38:11 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:38:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000680)={@mcast1, 0x0, r2}) 14:38:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x4b0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x3e8, 0x1fc, 0x1fc, 0x3e8, 0x1fc, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f0, 0x310, 0x0, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@hashlimit3={{0x158}, {'vlan0\x00', {0x0, 0x2236, 0x0, 0x0, 0x0, 0x78dd, 0x4}}}]}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@private0, @local, [], [], 'team0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xd8}, @common=@inet=@SET3={0x34}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x50c) 14:38:11 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000001c0)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write(r0, &(0x7f0000000040)="18000500", 0x4) 14:38:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) 14:38:11 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:11 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000000)={@link_local, @link_local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2c, 0x0, @private, @private}}}}}, 0x0) 14:38:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a0, &(0x7f00000001c0)={'wg0\x00'}) 14:38:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001d000100000000000000000007000000", @ANYRES32], 0x30}}, 0x0) 14:38:11 executing program 0: syz_emit_ethernet(0x26, &(0x7f0000000040)={@link_local, @link_local, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private=0x1, {[@lsrr={0x83, 0x3}]}}}}}}, 0x0) 14:38:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:11 executing program 3: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x4, @thr={&(0x7f0000000000), 0x0}}, 0x0) [ 315.047443][T11962] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @restrict]}}, &(0x7f0000000480)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 14:38:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, 0x0, 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:11 executing program 0: bpf$MAP_CREATE(0x7, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:38:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8932, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 14:38:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) 14:38:12 executing program 0: syz_clone(0x24004500, 0x0, 0x0, 0x0, 0x0, 0x0) 14:38:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, 0x0, 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:12 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:12 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x18}, 0xc) 14:38:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000540)=""/210, 0x26, 0xd2, 0x1}, 0x20) 14:38:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, 0x0, 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:12 executing program 4: pselect6(0x40, &(0x7f0000000540), &(0x7f0000000580)={0xf3e}, 0x0, &(0x7f0000000600)={0x77359400}, 0x0) 14:38:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:12 executing program 3: futex(&(0x7f0000000140), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x5) 14:38:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:12 executing program 4: r0 = socket(0x2, 0x8000a, 0x0) connect$caif(r0, 0x0, 0x0) 14:38:12 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40c0030, 0xffffffffffffffff, 0x8000000) 14:38:12 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) 14:38:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:13 executing program 5: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)) 14:38:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:13 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000005800)={@broadcast, @random="97ccc37d28dc", @val, {@ipv6}}, 0x0) 14:38:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:13 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x43, 0x0, 0x0) 14:38:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, 0x0, 0x8) 14:38:13 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000240)={@local, @local, @val, {@ipv6}}, 0x0) 14:38:13 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x8000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 14:38:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0/file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 14:38:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, 0x0, 0x8) 14:38:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) [ 316.499705][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.506242][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 316.748238][ T14] usb 6-1: new high-speed USB device number 25 using dummy_hcd [ 317.308404][ T14] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 317.317460][ T14] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 317.326373][ T14] usb 6-1: Product: syz [ 317.330845][ T14] usb 6-1: Manufacturer: syz [ 317.335436][ T14] usb 6-1: SerialNumber: syz [ 317.379407][ T14] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 317.948344][ T3707] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 318.156591][ T1127] usb 6-1: USB disconnect, device number 25 14:38:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0xa, 0x0, 0x0) 14:38:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000200), 0x10) 14:38:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)=ANY=[]) 14:38:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, 0x0, 0x8) 14:38:15 executing program 5: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 14:38:15 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x123a41) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, 0x0) 14:38:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[], 0x8) 14:38:15 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000480)={0x0, 0x0, 0x11, &(0x7f00000000c0)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc}]}}) 14:38:15 executing program 3: clock_gettime(0x0, &(0x7f0000000d00)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000a00), &(0x7f0000000a40)={0x7}, 0x0, &(0x7f0000000d40)={0x0, r0+60000000}, &(0x7f0000000dc0)={&(0x7f0000000d80)={[0x4]}, 0x8}) 14:38:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 14:38:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[], 0x8) 14:38:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:15 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x4, 0x8, 0x4}, 0x48) 14:38:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}) 14:38:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[], 0x8) [ 318.978468][ T3707] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 318.986040][ T3707] ath9k_htc: Failed to initialize the device [ 318.993138][ T1127] usb 6-1: ath9k_htc: USB layer deinitialized [ 319.028272][ T14] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 319.290081][ T14] usb 5-1: Using ep0 maxpacket: 16 [ 319.368284][ T1127] usb 6-1: new high-speed USB device number 26 using dummy_hcd [ 319.508318][ T14] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 319.700841][ T14] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 319.710038][ T14] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 319.718042][ T14] usb 5-1: Product: syz [ 319.722879][ T14] usb 5-1: Manufacturer: syz [ 319.727472][ T14] usb 5-1: SerialNumber: syz [ 319.938514][ T1127] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 319.948378][ T1127] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 319.956366][ T1127] usb 6-1: Product: syz [ 319.960602][ T1127] usb 6-1: Manufacturer: syz [ 319.965186][ T1127] usb 6-1: SerialNumber: syz [ 319.973121][ T22] usb 5-1: USB disconnect, device number 3 [ 320.019883][ T1127] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 320.678433][ T1127] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 320.883617][ T22] usb 6-1: USB disconnect, device number 26 14:38:18 executing program 5: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x8) 14:38:18 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000000), 0x1, 0x0) 14:38:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0xa, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0x1}}}, 0x24}}, 0x0) 14:38:18 executing program 4: r0 = socket(0x18, 0x0, 0x2) accept4$rose(r0, 0x0, 0x0, 0x0) 14:38:18 executing program 0: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:18 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x8, &(0x7f0000001000)={[{0x1, 0x4e00, "99"}]}) 14:38:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x8) 14:38:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x8) [ 321.698211][ T1127] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 321.705531][ T1127] ath9k_htc: Failed to initialize the device [ 321.712527][ T22] usb 6-1: ath9k_htc: USB layer deinitialized [ 321.748212][ T3749] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 321.778267][ T6] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 322.099849][ T22] usb 6-1: new high-speed USB device number 27 using dummy_hcd [ 322.318364][ T6] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 322.327792][ T6] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 322.328254][ T3749] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 322.336794][ T6] usb 5-1: Product: syz [ 322.345719][ T3749] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 322.352898][ T6] usb 5-1: Manufacturer: syz [ 322.357618][ T3749] usb 1-1: Product: syz [ 322.364946][ T6] usb 5-1: SerialNumber: syz [ 322.366494][ T3749] usb 1-1: Manufacturer: syz [ 322.375813][ T3749] usb 1-1: SerialNumber: syz [ 322.419408][ T3749] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 322.429334][ T6] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 322.618286][ T22] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 322.627396][ T22] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 322.639623][ T22] usb 6-1: Product: syz [ 322.643812][ T22] usb 6-1: Manufacturer: syz [ 322.650551][ T22] usb 6-1: SerialNumber: syz [ 322.698915][ T22] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 322.988529][ T3749] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 323.028390][ T3707] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 323.201417][ T3673] usb 1-1: USB disconnect, device number 12 [ 323.244054][ T3671] usb 5-1: USB disconnect, device number 4 [ 323.278304][ T22] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 323.482656][ T14] usb 6-1: USB disconnect, device number 27 14:38:20 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 14:38:20 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r0 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r0, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 14:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000c40)) 14:38:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:20 executing program 0: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001840)=[{0x0}], 0x0, 0x0) 14:38:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8970, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:38:20 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r0 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r0, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 14:38:20 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)={&(0x7f0000000440)={0xec4, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x54, 0x1, "6ef42d2f5df0b4a3a1df0a2b4b6fd6225e40fa92ace8e0df11033cfbc2c3e78294641782e4c0ef8410adcbb8da06c6c4d1d6be3f03af065a70dd476e53011163ce12bf2f959886f984f14d38b940d021"}, @INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "c2c45d8563708658d4a19d1b6b5fab481f3514332693ed9d45bc12fdd5ec1b7932a722c42b65c0008693d4625a2d0cb9e963ee8df1117815837d1ee08b9b1f5129bccf7ac28a8223c3ae4b3b5757f852be541252a20110296db8473b410dd698d17f55960405335a06ae369b0130a1614d9c86e87e9de8497c7c8430458f95d724128d6b9c2d81da29ff3f2ad39d5fdad2fb00f0c9d8b2a1946984266d2f01f8940a16775c2d5e858f21cff59e24e3a4726b7450830ab3375b"}, @INET_DIAG_REQ_BYTECODE={0xcf, 0x1, "8edddc3ceebc6b38bf9eb8ee1ba185c9104363cc40da7a67c3cb24bb1ad1ce14dfe3a4b2ce5c8d8b15b8967bee83827f79ff9d4b27f452d4133e5ef7378673723626542690cda9fe4a5d08d15111bb78f1376a6f71e442593ee2f0bcc2db2a172e3661f2c02b0f8ad46bfe095793bc0a56f867e5b59628dfa1080449af0adafb0d71c5d635c6b49bf7cd26c6b85b4ef2976a7810a411a138e3b46883594487b3540e03c4d439f5f1c6a11febc58ec856eaa91c4c93a357553ec1bedc0e8b435b99b8da21edb63093855bc8"}, @INET_DIAG_REQ_BYTECODE={0x80, 0x1, "0e932c66415a3524d1b7c610e5270852711926312f678194c02b716ab0815fbdca2280ce0884c795b4c01bd01c86a20dd5f50b099dd81750833a64629159a33e9622306cc8449237402a82d88bcc24774e77f85f99ecf15012c8e8a26c5265d00d25917a802fbf377e62c6386231a8d344aed63dfa4ba9c464ad5224"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "3331bc1818d46dbb48cce4bda358d1496eab6ca70541c07654d445bfeb06b3470fbe79061550993dd5c796976c11b069442c23ea2af105d61709dea0738206f6b7246e80f46c1955a60a3ab508b55bc7fd731498f90d845284efb8efcfd28a2236eb6827933782b41dc1b2a9418892cce077f86357dcd19520363b98fc44fca66712ff2e4516027aa84baca80e9738dd0deff0c37ef8d21df31e67de7ac7a6836cc9333f90ee4d0867b3778719313d20b884d33cdfce44ea5c1d00bde7efa95bde89a7862293"}, @INET_DIAG_REQ_BYTECODE={0x31, 0x1, "c751248dcc99491ebc367f555676eaa6f6734f68c2384b8e86b996ee56d26e4afadb239ceda8deb54e584e5865"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "ad82042837028d6e3272410315b6ef9df5d8b78d5cd7ea51adcee7bc9e894826d36bd1657c9026a3599fceaa65166b4b041bcde7142b594a16106caffc90397ff7fe684ffc"}, @INET_DIAG_REQ_BYTECODE={0xac5, 0x1, "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"}]}, 0xec4}, 0x1, 0x0, 0x0, 0x10}, 0x884) 14:38:20 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) 14:38:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x1, 0x5, 0x1df, 0x9, 0x1}, 0x48) [ 324.018187][ T3749] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 324.025175][ T3749] ath9k_htc: Failed to initialize the device [ 324.046565][ T3673] usb 1-1: ath9k_htc: USB layer deinitialized 14:38:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x13, 0x0, "b52b10c7dcfe7f7d699729d3c811286fbe5b914a76a1226b77eca482c17ec2a46830c7b020c523bcf4542753fa340538c912900e9f406904a5ee42b8add1213b5adfa737c2d4636a505ce5b374b71e51"}, 0xd8) 14:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8943, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 324.098213][ T3707] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 324.105236][ T3707] ath9k_htc: Failed to initialize the device [ 324.127275][ T3671] usb 5-1: ath9k_htc: USB layer deinitialized [ 324.338308][ T22] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 324.348629][ T22] ath9k_htc: Failed to initialize the device [ 324.355943][ T14] usb 6-1: ath9k_htc: USB layer deinitialized [ 324.718178][ T14] usb 6-1: new high-speed USB device number 28 using dummy_hcd [ 325.278376][ T14] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 325.287806][ T14] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 325.295861][ T14] usb 6-1: Product: syz [ 325.300106][ T14] usb 6-1: Manufacturer: syz [ 325.304712][ T14] usb 6-1: SerialNumber: syz [ 325.352161][ T14] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 325.988624][ T14] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 326.399890][ T3673] usb 6-1: USB disconnect, device number 28 14:38:23 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 14:38:23 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r0 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r0, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 14:38:23 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x1, &(0x7f0000000100)="10"}) 14:38:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002ac0)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83004a463ea50705, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:38:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='sbsector=0x00000200000063']) 14:38:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5460, 0x0) 14:38:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x11, 0x4) 14:38:23 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40045402, 0x0) 14:38:23 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0xe0440) read$FUSE(r0, 0x0, 0x0) 14:38:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:23 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000980)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x40}}}}}}}]}}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000a00)=@string={0x4, 0x3, "497f"}}, {0x0, 0x0}]}) 14:38:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) [ 327.058592][ T14] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 327.066483][ T14] ath9k_htc: Failed to initialize the device [ 327.073028][ T3673] usb 6-1: ath9k_htc: USB layer deinitialized [ 327.278277][ T1127] usb 3-1: new high-speed USB device number 17 using dummy_hcd [ 327.448240][ T3673] usb 6-1: new high-speed USB device number 29 using dummy_hcd [ 327.518363][ T1127] usb 3-1: Using ep0 maxpacket: 16 [ 327.638314][ T1127] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 328.008271][ T1127] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 328.017398][ T1127] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 328.025620][ T1127] usb 3-1: Product: syz [ 328.029855][ T1127] usb 3-1: SerialNumber: syz [ 328.038323][ T3673] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 328.047527][ T3673] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 328.055675][ T3673] usb 6-1: Product: syz [ 328.060302][ T3673] usb 6-1: Manufacturer: syz [ 328.064947][ T3673] usb 6-1: SerialNumber: syz [ 328.109020][ T3673] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 328.318320][ T1127] cdc_ncm 3-1:1.0: bind() failure [ 328.325456][ T1127] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 328.333275][ T1127] cdc_ncm 3-1:1.1: bind() failure [ 328.347659][ T1127] usb 3-1: USB disconnect, device number 17 [ 328.768334][ T22] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 329.175790][ T3671] usb 6-1: USB disconnect, device number 29 14:38:26 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 14:38:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@gettaction={0x30, 0x32, 0xcb2ba23f90996c2b, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x30}}, 0x0) 14:38:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000f80)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) 14:38:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='gid_map\x00') read$rfkill(r0, &(0x7f0000000000), 0x8) read$rfkill(r0, 0x0, 0xd) 14:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:26 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5452, &(0x7f0000000040)) 14:38:26 executing program 0: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000980)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x6, 0x0, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0xc0, 0x7, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x2b, 0x80, 0x3}}}}}}}]}}, &(0x7f0000000900)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x310, 0x0, 0x0, 0x3f, 0x0, 0x13}, 0x15, &(0x7f00000005c0)={0x5, 0xf, 0x15, 0x3, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x1}, @ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x4, [{0xe9, &(0x7f0000000a00)=@string={0xe9, 0x3, "497fced2c17f8b8ddd7ffca6a8a394b0c7b84fb42c96217b935fee47d4d8c7afb330d1d2f98d70b9017e271ec8e1598f06997a6e1d99349da219870d91d07e16127d0c532acd780eef5c8efd9ff2db1f592ac5d61907b8b37d83fb8b62b72a48040aa81acc8493300efc406104cf7c4a3aca5a64b25320616800bf9eecd0b0f062f7065c203b2f8436239f81783020f2e3a1c31c07455d88b47a5f9227fd77513d70fdbc0a9fd9737baaf8241b0e65186651ef13276794bdae197e087825353214d6c02623ad20a8aed324b4afe4117ea2253a2b2d98e3de85e0d0aa161c2e633fde4b510fe558"}}, {0x74, &(0x7f0000000640)=@string={0x74, 0x3, "f5b53f199bb14c5d1f0963155d947b9d0822cae722fde4971e8872120e48f335dbb4e3f47e3fcc943293de4df46e9bbb72d9619d01f14f60dc1b7eaca933480d22eaa8150aaafe34eb363ae90dede295e27b1c1b1c96c1c7100d1e059ac003980e426c5e61f6c51b4f17b01a1fc9998081df"}}, {0xab, &(0x7f0000000700)=@string={0xab, 0x3, "9eb111bf845a78f184e48d80efab07d2c752bc6aab0513bb9922f6baf571455e675ae45fdea7e28fbee050ab219c68bd8e2cb0e071feffb020a376a2243b574dd320642b2e4927cbccdf53009b01a1e0a08193cbfe98bd5d234fa09b601abcde335c154f1e48c11a5b0343551147bad3e17fa7428a8ff2df61119409b224066c0438c1cce783c178db92ba680ae827357060774980a32d3a550cd6c9f218e69055687e64c48fb6d90f"}}, {0x0, 0x0}]}) 14:38:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_tables_matches\x00') read$rfkill(r0, 0x0, 0x0) 14:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4b, &(0x7f00000000c0)={@mcast2}, 0x14) 14:38:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 14:38:26 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000980)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) [ 329.868252][ T22] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 329.875842][ T22] ath9k_htc: Failed to initialize the device [ 329.883194][ T3671] usb 6-1: ath9k_htc: USB layer deinitialized [ 330.048210][ T6] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 330.108327][ T3749] usb 4-1: new high-speed USB device number 13 using dummy_hcd [ 330.268292][ T3671] usb 6-1: new high-speed USB device number 30 using dummy_hcd [ 330.288292][ T6] usb 1-1: Using ep0 maxpacket: 16 [ 330.378228][ T3749] usb 4-1: Using ep0 maxpacket: 16 [ 330.408339][ T6] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 330.423751][ T6] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 330.508410][ T3749] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 330.519845][ T3749] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 330.530083][ T3749] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 330.540310][ T3749] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 330.550384][ T3749] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 330.560756][ T3749] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 330.739069][ T3749] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 330.748336][ T3749] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 330.756331][ T3749] usb 4-1: Product: syz [ 330.761002][ T3749] usb 4-1: Manufacturer: syz [ 330.765617][ T3749] usb 4-1: SerialNumber: syz [ 330.788296][ T6] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 330.797889][ T6] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 330.806433][ T6] usb 1-1: Product: 놞뼑媄肍꯯툇勇檼֫묓⊙뫶燵幅婧忤꟞迢ꭐ鰡뵨Ⲏﹱ냿ꌠꉶ㬤䵗⃓⭤䤮쬧Sƛ膠쮓飾嶽伣鮠᩠尳伕䠞᫁͛啃䜑펺翡䊧辊ᅡঔ⒲氆㠄쳁菧磁鋛梺㔧恰䥷ꎀ㨭ౕ짖ᣲ郦桕摾迄 [ 330.830907][ T6] usb 1-1: Manufacturer: 뗵᤿놛嵌टᕣ鑝鵻∈ﴢ韤蠞ቲ䠎㗳듛㽾铌録䷞滴뮛鵡恏ᯜ걾㎩ൈᖨꨊ㓾㛫闢篢ᬜ阜쟁ഐԞ삚頃䈎幬ᯅᝏ᪰줟肙 [ 330.858395][ T3671] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 330.867611][ T3671] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 330.875682][ T3671] usb 6-1: Product: syz [ 330.879911][ T3671] usb 6-1: Manufacturer: syz [ 330.884520][ T3671] usb 6-1: SerialNumber: syz [ 330.929439][ T3671] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 331.078419][ T3749] cdc_ncm 4-1:1.0: bind() failure [ 331.085521][ T3749] cdc_ncm 4-1:1.1: CDC Union missing and no IAD found [ 331.093522][ T3749] cdc_ncm 4-1:1.1: bind() failure [ 331.106026][ T3749] usb 4-1: USB disconnect, device number 13 [ 331.128515][ T6] cdc_ncm 1-1:1.0: bind() failure [ 331.135619][ T6] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 331.142753][ T6] cdc_ncm 1-1:1.1: bind() failure [ 331.151212][ T6] usb 1-1: USB disconnect, device number 13 [ 331.588390][ T3671] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 331.993730][ T3749] usb 6-1: USB disconnect, device number 30 14:38:29 executing program 4: syz_emit_ethernet(0x1a, &(0x7f00000000c0)={@local, @local, @val={@void}, {@llc={0x4, {@snap={0x0, 0x0, "c9", "b5a13e"}}}}}, 0x0) 14:38:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x11}, 0x48) 14:38:29 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, &(0x7f0000001000)) 14:38:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:29 executing program 0: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)={0x20000000}) 14:38:29 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000980)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0xcf, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x0, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0xc0, 0x7, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x2b, 0x80, 0x3}}}}}}}]}}, &(0x7f0000000900)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x310, 0x0, 0x0, 0x3f, 0x0, 0x13}, 0x15, &(0x7f00000005c0)={0x5, 0xf, 0x15, 0x3, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x1, 0x9}, @ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x4, [{0x74, &(0x7f0000000640)=@string={0x74, 0x3, "f5b53f199bb14c5d1f0963155d947b9d0822cae722fde4971e8872120e48f335dbb4e3f47e3fcc943293de4df46e9bbb72d9619d01f14f60dc1b7eaca933480d22eaa8150aaafe34eb363ae90dede295e27b1c1b1c96c1c7100d1e059ac003980e426c5e61f6c51b4f17b01a1fc9998081df"}}, {0x4, &(0x7f00000006c0)=@lang_id={0x4, 0x3, 0x405}}, {0xab, &(0x7f0000000700)=@string={0xab, 0x3, "9eb111bf845a78f184e48d80efab07d2c752bc6aab0513bb9922f6baf571455e675ae45fdea7e28fbee050ab219c68bd8e2cb0e071feffb020a376a2243b574dd320642b2e4927cbccdf53009b01a1e0a08193cbfe98bd5d234fa09b601abcde335c154f1e48c11a5b0343551147bad3e17fa7428a8ff2df61119409b224066c0438c1cce783c178db92ba680ae827357060774980a32d3a550cd6c9f218e69055687e64c48fb6d90f"}}, {0x0, 0x0}]}) 14:38:29 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000100)=@x25, 0x80) 14:38:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='auxv\x00') read$hidraw(r0, 0x0, 0x0) 14:38:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8906, 0x0) 14:38:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:29 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) 14:38:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040)=ANY=[], 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x6, 0x0, 0x0) [ 332.668435][ T3671] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 332.676330][ T3671] ath9k_htc: Failed to initialize the device [ 332.683513][ T3749] usb 6-1: ath9k_htc: USB layer deinitialized [ 332.778295][ T14] usb 3-1: new high-speed USB device number 18 using dummy_hcd [ 333.018191][ T14] usb 3-1: Using ep0 maxpacket: 16 [ 333.068308][ T3749] usb 6-1: new high-speed USB device number 31 using dummy_hcd [ 333.138934][ T14] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 333.150154][ T14] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 333.518617][ T14] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 333.527877][ T14] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 333.536273][ T14] usb 3-1: Product: 놞뼑媄肍꯯툇勇檼֫묓⊙뫶燵幅婧忤꟞迢ꭐ鰡뵨Ⲏﹱ냿ꌠꉶ㬤䵗⃓⭤䤮쬧Sƛ膠쮓飾嶽伣鮠᩠尳伕䠞᫁͛啃䜑펺翡䊧辊ᅡঔ⒲氆㠄쳁菧磁鋛梺㔧恰䥷ꎀ㨭ౕ짖ᣲ郦桕摾迄 [ 333.560943][ T14] usb 3-1: Manufacturer: Ѕ [ 333.708362][ T3749] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 333.717487][ T3749] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 333.725579][ T3749] usb 6-1: Product: syz [ 333.729825][ T3749] usb 6-1: Manufacturer: syz [ 333.734429][ T3749] usb 6-1: SerialNumber: syz [ 333.789568][ T3749] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 333.878387][ T14] cdc_ncm 3-1:1.0: bind() failure [ 333.885300][ T14] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 333.892260][ T14] cdc_ncm 3-1:1.1: bind() failure [ 333.901923][ T14] usb 3-1: USB disconnect, device number 18 [ 334.438332][ T3749] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 334.845329][ T3673] usb 6-1: USB disconnect, device number 31 14:38:32 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, &(0x7f0000001000)) 14:38:32 executing program 4: sync() rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) 14:38:32 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@sbsector}]}) 14:38:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:32 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write(r0, 0x0, 0x0) 14:38:32 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x0, 0x0) r2 = dup(r0) fcntl$dupfd(r1, 0x406, r2) 14:38:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f00000000c0)=0x7, 0x4) 14:38:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x31, 0x0, 0x0) 14:38:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0x40ffffff, 0x4) 14:38:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDELRT(r0, 0x4020940d, &(0x7f0000000000)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @dev}, {0x2, 0x0, @local}}) 14:38:32 executing program 0: modify_ldt$write(0x1, &(0x7f00000016c0)={0x3ff}, 0x10) [ 335.468213][ T3749] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 335.484607][ T3749] ath9k_htc: Failed to initialize the device [ 335.504609][ T3673] usb 6-1: ath9k_htc: USB layer deinitialized [ 335.908200][ T3673] usb 6-1: new high-speed USB device number 32 using dummy_hcd [ 336.478310][ T3673] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 336.487622][ T3673] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 336.495695][ T3673] usb 6-1: Product: syz [ 336.499917][ T3673] usb 6-1: Manufacturer: syz [ 336.504538][ T3673] usb 6-1: SerialNumber: syz [ 336.548838][ T3673] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 337.198368][ T3673] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 337.604779][ T3749] usb 6-1: USB disconnect, device number 32 14:38:34 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, &(0x7f0000001000)) 14:38:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0xf}}, 0x0) 14:38:34 executing program 0: r0 = fsopen(&(0x7f0000000200)='nfs4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000100)='!\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c) 14:38:34 executing program 4: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) 14:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) 14:38:34 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 14:38:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x15, 0x0, &(0x7f0000000140)) 14:38:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x82, 0x0, 0x0) 14:38:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, 0x0, &(0x7f0000000080)) 14:38:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0xd68, 0x4, 0x3, 0x40}, 0x48) [ 338.258738][ T3673] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 338.272352][ T3673] ath9k_htc: Failed to initialize the device [ 338.286390][ T3749] usb 6-1: ath9k_htc: USB layer deinitialized [ 338.668284][ T3749] usb 6-1: new high-speed USB device number 33 using dummy_hcd [ 339.258396][ T3749] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 339.267483][ T3749] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 339.276520][ T3749] usb 6-1: Product: syz [ 339.280730][ T3749] usb 6-1: Manufacturer: syz [ 339.285327][ T3749] usb 6-1: SerialNumber: syz [ 339.339136][ T3749] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 339.968281][ T3749] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 340.374490][ T3673] usb 6-1: USB disconnect, device number 33 14:38:37 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x4, &(0x7f0000001000)={[{}]}) 14:38:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f00000002c0)=0x4, 0x4) 14:38:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffffffd}]}) 14:38:37 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 14:38:37 executing program 0: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, &(0x7f0000001000)) 14:38:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:37 executing program 2: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, &(0x7f0000001000)) 14:38:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) 14:38:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) 14:38:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000540)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB='b'], 0x8) [ 341.058220][ T3749] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 341.065349][ T3749] ath9k_htc: Failed to initialize the device [ 341.073165][ T3673] usb 6-1: ath9k_htc: USB layer deinitialized [ 341.168280][ T3671] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 341.248269][ T22] usb 3-1: new high-speed USB device number 19 using dummy_hcd [ 341.458305][ T3673] usb 6-1: new high-speed USB device number 34 using dummy_hcd [ 341.708295][ T3671] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 341.717580][ T3671] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 341.725970][ T3671] usb 1-1: Product: syz [ 341.730287][ T3671] usb 1-1: Manufacturer: syz [ 341.734929][ T3671] usb 1-1: SerialNumber: syz [ 341.783287][ T3671] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 341.791706][ T22] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 341.803786][ T22] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 341.812785][ T22] usb 3-1: Product: syz [ 341.816963][ T22] usb 3-1: Manufacturer: syz [ 341.821776][ T22] usb 3-1: SerialNumber: syz [ 341.864969][ T22] usb 3-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 341.988468][ T3673] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 341.997572][ T3673] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 342.010464][ T3673] usb 6-1: Product: syz [ 342.014632][ T3673] usb 6-1: Manufacturer: syz [ 342.020749][ T3673] usb 6-1: SerialNumber: syz [ 342.058918][ T3673] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 342.388346][ T3671] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 342.438288][ T22] usb 3-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 342.638321][ T3673] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 342.810315][ T3749] usb 1-1: USB disconnect, device number 14 [ 342.856085][ T6] usb 3-1: USB disconnect, device number 19 [ 343.045544][ T14] usb 6-1: USB disconnect, device number 34 [ 343.458182][ T22] ath9k_htc 3-1:1.0: ath9k_htc: Target is unresponsive [ 343.465243][ T22] ath9k_htc: Failed to initialize the device [ 343.471372][ T3671] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 343.478349][ T3671] ath9k_htc: Failed to initialize the device [ 343.484513][ T3749] usb 1-1: ath9k_htc: USB layer deinitialized [ 343.490972][ T6] usb 3-1: ath9k_htc: USB layer deinitialized 14:38:40 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x4, &(0x7f0000001000)={[{}]}) 14:38:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:38:40 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 14:38:40 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:40 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) [ 343.571360][ T3674] hid-generic 0000:0000:0000.0067: hidraw0: HID v0.00 Device [syz1] on syz1 [ 343.588402][ T1127] hid-generic 0000:0000:0000.0068: hidraw1: HID v0.00 Device [syz1] on syz1 14:38:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:40 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) [ 343.693498][ T3674] hid-generic 0000:0000:0000.0069: hidraw2: HID v0.00 Device [syz1] on syz1 [ 343.703300][ T3673] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 343.716183][ T3673] ath9k_htc: Failed to initialize the device [ 343.723414][ T14] usb 6-1: ath9k_htc: USB layer deinitialized [ 344.088219][ T14] usb 6-1: new high-speed USB device number 35 using dummy_hcd [ 344.618368][ T14] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 344.628056][ T14] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 344.637063][ T14] usb 6-1: Product: syz [ 344.642025][ T14] usb 6-1: Manufacturer: syz [ 344.646629][ T14] usb 6-1: SerialNumber: syz [ 344.688764][ T14] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 345.258343][ T14] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 345.663134][ T3674] usb 6-1: USB disconnect, device number 35 14:38:43 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x4, &(0x7f0000001000)={[{}]}) 14:38:43 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:43 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:43 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:43 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:43 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) [ 346.203505][ T3673] hid-generic 0000:0000:0000.006A: hidraw0: HID v0.00 Device [syz1] on syz1 14:38:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:43 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) [ 346.263849][ T3673] hid-generic 0000:0000:0000.006B: hidraw0: HID v0.00 Device [syz1] on syz1 [ 346.318438][ T1127] hid-generic 0000:0000:0000.006C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 346.338237][ T14] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 346.350687][ T14] ath9k_htc: Failed to initialize the device [ 346.357094][ T3674] usb 6-1: ath9k_htc: USB layer deinitialized [ 346.748194][ T3674] usb 6-1: new high-speed USB device number 36 using dummy_hcd [ 347.319291][ T3674] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 347.328407][ T3674] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 347.336398][ T3674] usb 6-1: Product: syz [ 347.340836][ T3674] usb 6-1: Manufacturer: syz [ 347.345426][ T3674] usb 6-1: SerialNumber: syz [ 347.391757][ T3674] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 348.058256][ T3674] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 348.462819][ T3749] usb 6-1: USB disconnect, device number 36 14:38:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, 0x0) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:45 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x74}]}) 14:38:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x100, 0x100, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2}}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 14:38:45 executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000100)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x83, &(0x7f0000000180)={r2}, &(0x7f00000001c0)=0x8) 14:38:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r0) 14:38:45 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x17, 0x0, &(0x7f0000000140)) 14:38:45 executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000100)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x83, &(0x7f0000000180)={r2}, &(0x7f00000001c0)=0x8) 14:38:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x3, 0x0, &(0x7f0000000180)={0x0, 0x0}) 14:38:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) 14:38:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) readahead(r0, 0x0, 0x0) 14:38:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, 0x0) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:38:45 executing program 2: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0) 14:38:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r0 = getuid() fchownat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', r0, 0x0, 0x0) 14:38:45 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b6b10000000000000700000018110000186ed111446d18138d2ba69ee3fb5697aa2282871677f1af1a83e83448e09eba55bbe9f0581c5a5b20907b3c1a7ee53a653cbb7513481da1ea16e886f4ba6fde9ef87aa2d4e608c49d90b92dbb81043d57e237d8dc825d68635540463598a1e585f69384e0a0a062aee29828c779b91791e6e2c4b73070dc0e4f52449bddd731b3a7649c7bd8841c1ba9b5de82345469aab4f3362836495e9832a75347836deff01552e0964f1cf6fbaf0b07c2b8a7260c1695d68cd3dee9", @ANYRES32, @ANYRES16=r5], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, r5]}, 0x80) pwritev(r1, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff}], 0x1, 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:46 executing program 5: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/kexec_crash_size', 0x0, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:38:46 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000002940)={@random="eb25c1646d00", @random="164a40502ece", @val, {@ipv6}}, 0x0) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:38:46 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/power_supply', 0x101040, 0x0) [ 349.148360][ T3674] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 349.155442][ T3674] ath9k_htc: Failed to initialize the device [ 349.186087][ T3749] usb 6-1: ath9k_htc: USB layer deinitialized 14:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, 0x0) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:46 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x676f00, 0x0) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:38:46 executing program 2: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33a3f1f4f06c824c) 14:38:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) 14:38:46 executing program 5: semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000000c0)=""/223) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 14:38:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 14:38:46 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) openat$cgroup_pressure(r0, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) 14:38:46 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b6b10000000000000700000018110000186ed111446d18138d2ba69ee3fb5697aa2282871677f1af1a83e83448e09eba55bbe9f0581c5a5b20907b3c1a7ee53a653cbb7513481da1ea16e886f4ba6fde9ef87aa2d4e608c49d90b92dbb81043d57e237d8dc825d68635540463598a1e585f69384e0a0a062aee29828c779b91791e6e2c4b73070dc0e4f52449bddd731b3a7649c7bd8841c1ba9b5de82345469aab4f3362836495e9832a75347836deff01552e0964f1cf6fbaf0b07c2b8a7260c1695d68cd3dee9", @ANYRES32, @ANYRES16=r5], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, r5]}, 0x80) pwritev(r1, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff}], 0x1, 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:38:46 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sync_file_range(r0, 0x0, 0x0, 0x4) 14:38:46 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETNCNT(r0, 0x4, 0xe, 0x0) 14:38:46 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$eventfd(r0, 0x0, 0x1b) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) 14:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, 0x0, 0x0) 14:38:46 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, 0x0, 0x0) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:38:46 executing program 5: pselect6(0x40, &(0x7f00000011c0), &(0x7f0000001200)={0xfffffffffffffffd}, 0x0, 0x0, 0x0) 14:38:46 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000080)='memory.pressure\x00', 0x2, 0x0) 14:38:46 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b6b10000000000000700000018110000186ed111446d18138d2ba69ee3fb5697aa2282871677f1af1a83e83448e09eba55bbe9f0581c5a5b20907b3c1a7ee53a653cbb7513481da1ea16e886f4ba6fde9ef87aa2d4e608c49d90b92dbb81043d57e237d8dc825d68635540463598a1e585f69384e0a0a062aee29828c779b91791e6e2c4b73070dc0e4f52449bddd731b3a7649c7bd8841c1ba9b5de82345469aab4f3362836495e9832a75347836deff01552e0964f1cf6fbaf0b07c2b8a7260c1695d68cd3dee9", @ANYRES32, @ANYRES16=r5], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, r5]}, 0x80) pwritev(r1, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff}], 0x1, 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:46 executing program 0: r0 = gettid() sched_getaffinity(r0, 0x8, &(0x7f0000000300)) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:38:46 executing program 5: sendto$packet(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 14:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, &(0x7f0000000080)) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:38:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 14:38:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000400), 0x0, 0x4000) 14:38:46 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000), 0xfffffffffffffffc) 14:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:46 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b6b10000000000000700000018110000186ed111446d18138d2ba69ee3fb5697aa2282871677f1af1a83e83448e09eba55bbe9f0581c5a5b20907b3c1a7ee53a653cbb7513481da1ea16e886f4ba6fde9ef87aa2d4e608c49d90b92dbb81043d57e237d8dc825d68635540463598a1e585f69384e0a0a062aee29828c779b91791e6e2c4b73070dc0e4f52449bddd731b3a7649c7bd8841c1ba9b5de82345469aab4f3362836495e9832a75347836deff01552e0964f1cf6fbaf0b07c2b8a7260c1695d68cd3dee9", @ANYRES32, @ANYRES16=r5], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, r5]}, 0x80) pwritev(r1, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff}], 0x1, 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:46 executing program 2: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) 14:38:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0xfffffffffffffd59) 14:38:46 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast1}, 0x14) 14:38:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:46 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) 14:38:46 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x0, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) 14:38:47 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20600, 0x0) 14:38:47 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000006d00)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, 0x1c, 0x0, 0x0, 0x0, 0xfffffffffffffe2a}}], 0x42b, 0x0) 14:38:47 executing program 2: semget(0x0, 0x4, 0x108) 14:38:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:38:47 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b6b10000000000000700000018110000186ed111446d18138d2ba69ee3fb5697aa2282871677f1af1a83e83448e09eba55bbe9f0581c5a5b20907b3c1a7ee53a653cbb7513481da1ea16e886f4ba6fde9ef87aa2d4e608c49d90b92dbb81043d57e237d8dc825d68635540463598a1e585f69384e0a0a062aee29828c779b91791e6e2c4b73070dc0e4f52449bddd731b3a7649c7bd8841c1ba9b5de82345469aab4f3362836495e9832a75347836deff01552e0964f1cf6fbaf0b07c2b8a7260c1695d68cd3dee9", @ANYRES32, @ANYRES16=r5], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, r5]}, 0x80) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) 14:38:47 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, 0x0, &(0x7f00000010c0)) 14:38:47 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 14:38:47 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xad40, 0xc4) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2400, 0x0) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:38:47 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x40) [ 350.545472][ T26] audit: type=1800 audit(1652711927.368:16): pid=12502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=1169 res=0 errno=0 14:38:47 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:47 executing program 2: r0 = epoll_create(0x7fff) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 14:38:47 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000009c0)='/sys/devices/system', 0x0, 0x80) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}]}]}, 0x54}}, 0x0) [ 350.587475][ T26] audit: type=1800 audit(1652711927.408:17): pid=12502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=1169 res=0 errno=0 14:38:47 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}]}]}, 0x54}}, 0x0) 14:38:47 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 14:38:47 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) 14:38:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x80) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}]}]}, 0x54}}, 0x0) 14:38:47 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:47 executing program 0: syz_clone(0x0, &(0x7f0000001e00), 0x0, 0x0, 0x0, &(0x7f0000001f40)) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:47 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6841, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x37d9dc284637b975, 0x15) 14:38:47 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:47 executing program 0: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x12001, 0x0, 0x0) 14:38:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:47 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 14:38:47 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000009c0)='/sys/devices/system', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 14:38:47 executing program 0: r0 = inotify_init1(0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, 0x0) 14:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 14:38:48 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000680), 0x0) 14:38:48 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:48 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x28143, 0x40) 14:38:48 executing program 5: pipe2$9p(&(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ftruncate(r0, 0x0) 14:38:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:48 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 14:38:48 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000001480)=""/130) 14:38:48 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 14:38:48 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x0) 14:38:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 14:38:48 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) 14:38:48 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$FIGETBSZ(r0, 0x2, 0x0) 14:38:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x24, r1, 0x1, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x24}}, 0x0) 14:38:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:48 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:48 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002780)='/sys/class/dmi', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 14:38:48 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x0) 14:38:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:48 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000680), &(0x7f0000000700)={0x0}) [ 351.987714][T12594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 352.019959][T12594] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:48 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/devices/virtual', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) 14:38:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 14:38:49 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x210000, 0x40) 14:38:49 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000100)=""/158, 0x9e) 14:38:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt(r0, 0x1, 0x3, &(0x7f0000000000)=""/19, &(0x7f0000000040)=0x13) 14:38:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:49 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:49 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) fdatasync(r0) 14:38:49 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$P9_RSTATFS(r0, 0x0, 0x0) 14:38:49 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001240), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:38:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:38:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:38:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x28}, 0x0) 14:38:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, 0x0) 14:38:50 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 14:38:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@authinfo={0x10}], 0x10}, 0x0) 14:38:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x50}}, 0x0) 14:38:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) 14:38:50 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000a00)={&(0x7f0000000200)=@in={0x10}, 0x10, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000980)=[@sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @dstaddrv4={0x10}], 0x3c}, 0x0) 14:38:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000200), 0x8) 14:38:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 14:38:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000500), 0x4) [ 353.859216][T12665] sctp: [Deprecated]: syz-executor.0 (pid 12665) Use of int in max_burst socket option deprecated. [ 353.859216][T12665] Use struct sctp_assoc_value instead 14:38:51 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file0\x00', 0x0, 0x0) 14:38:51 executing program 5: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x20044590, &(0x7f0000000000)) 14:38:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x54}}, 0x0) 14:38:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000200), 0x88) 14:38:51 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, 0x0) 14:38:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:38:51 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_int(r0, 0x0, 0x8, 0x0, &(0x7f0000000080)) 14:38:51 executing program 2: r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c}, 0x1c) 14:38:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000340), 0x98) 14:38:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001580)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001540)=[@init={0x14}], 0x14}, 0x0) 14:38:51 executing program 0: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00') 14:38:51 executing program 5: socketpair(0x0, 0x0, 0x8, 0x0) 14:38:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:38:51 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) listen(r0, 0x3) 14:38:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0xffff, 0x0, 0x0, 0x0) 14:38:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, 0x0) 14:38:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x4c}}, 0x0) 14:38:52 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40041) 14:38:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f0000000080), &(0x7f0000000140)=0x8) 14:38:52 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 14:38:52 executing program 4: execve(0x0, &(0x7f00000002c0)=[&(0x7f0000000080)='\x00', &(0x7f0000000100)=',$\\%})\\(\x00'], 0x0) 14:38:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000200), 0x88) 14:38:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x20) 14:38:52 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 14:38:52 executing program 0: execve(0x0, &(0x7f0000000080)=[&(0x7f0000000040)='\x00'], 0x0) 14:38:52 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 14:38:53 executing program 0: rename(&(0x7f0000000080)='./file0\x00', 0x0) 14:38:53 executing program 5: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) 14:38:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000d80)=[{0x0}, {&(0x7f0000000c00)="a7", 0x1}], 0x2}, 0x0) 14:38:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 14:38:53 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000004d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004c00)}, 0x0) 14:38:53 executing program 2: acct(&(0x7f0000000240)='./file0\x00') 14:38:53 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f00000001c0)=0x1000, 0x4) 14:38:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 14:38:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 14:38:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[@rights], 0x10}, 0x0) 14:38:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x74}]}) 14:38:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000140)) 14:38:53 executing program 2: r0 = io_uring_setup(0x23e, &(0x7f0000000f40)) io_uring_setup(0x4086, &(0x7f0000000fc0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 14:38:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x13, 0x0, &(0x7f0000001580)) 14:38:53 executing program 1: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 4: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 0: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 4: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 1: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:53 executing program 0: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) r4 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) dup3(r4, r3, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6000) r6 = syz_io_uring_setup(0x2ad0, &(0x7f0000000000)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) dup3(r6, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b6b10000000000000700000018110000186ed111446d18138d2ba69ee3fb5697aa2282871677f1af1a83e83448e09eba55bbe9f0581c5a5b20907b3c1a7ee53a653cbb7513481da1ea16e886f4ba6fde9ef87aa2d4e608c49d90b92dbb81043d57e237d8dc825d68635540463598a1e585f69384e0a0a062aee29828c779b91791e6e2c4b73070dc0e4f52449bddd731b3a7649c7bd8841c1ba9b5de82345469aab4f3362836495e9832a75347836deff01552e0964f1cf6fbaf0b07c2b8a7260c1695d68cd3dee9", @ANYRES32, @ANYRES16=r5], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, r5]}, 0x80) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:54 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:54 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:54 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 357.379778][T12587] hid-generic 0000:0000:0000.006D: hidraw0: HID v0.00 Device [syz1] on syz1 14:38:54 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 357.428256][ T3707] hid-generic 0000:0000:0000.006E: hidraw0: HID v0.00 Device [syz1] on syz1 14:38:54 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/220, 0xdc}, {&(0x7f00000001c0)=""/70, 0x46}], 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:54 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:54 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:54 executing program 5: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a818"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 357.585019][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.609529][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 14:38:54 executing program 0: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a818"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 357.637020][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.668436][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 14:38:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040)={0x2}, 0x4) 14:38:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) [ 357.706554][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.740904][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.773755][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.809076][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.853026][T12587] hid-generic 0000:0000:0000.006F: unknown main item tag 0x0 [ 357.883118][T12587] hid-generic 0000:0000:0000.006F: hidraw0: HID v0.00 Device [syz1] on syz1 14:38:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:55 executing program 5: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:55 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:55 executing program 0: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:55 executing program 1: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:55 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:55 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec", 0x78, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:55 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:55 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:55 executing program 5: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000080)=ANY=[@ANYBLOB="8000", @ANYRES16=r2, @ANYBLOB="01000000000000000000030000004400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="e9ff0000", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100cb"], 0x80}}, 0x0) 14:38:55 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 358.435967][T12874] loop4: detected capacity change from 0 to 224 [ 358.517824][T12874] ISOFS: unable to read i-node block 56 [ 358.528656][T12874] isofs_fill_super: get root inode failed 14:38:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002580)=ANY=[], 0x16) 14:38:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 14:38:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002580)=ANY=[], 0x16) 14:38:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002580)=ANY=[], 0x16) 14:38:55 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 14:38:55 executing program 5: socket$packet(0x11, 0x0, 0x300) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002580)=ANY=[], 0x16) 14:38:55 executing program 0: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002580)=ANY=[], 0x16) 14:38:55 executing program 1: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000002580)=ANY=[], 0x16) [ 358.703275][T12899] loop4: detected capacity change from 0 to 224 14:38:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 14:38:55 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000002580)=ANY=[], 0x16) [ 358.782337][T12899] ISOFS: unable to read i-node block 56 [ 358.795324][T12899] isofs_fill_super: get root inode failed 14:38:55 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b82c", 0x2d) 14:38:55 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000002580)=ANY=[], 0x16) 14:38:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x69, 0x0) 14:38:55 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b82c", 0x2d) 14:38:55 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 358.964989][T12918] loop4: detected capacity change from 0 to 224 [ 358.997745][T12918] ISOFS: unable to read i-node block 56 [ 359.009081][T12918] isofs_fill_super: get root inode failed 14:38:55 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:55 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b8", 0x2c) 14:38:55 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b8", 0x2c) 14:38:55 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:56 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966", 0x29) 14:38:56 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 359.172250][T12931] loop4: detected capacity change from 0 to 224 [ 359.266978][T12931] ISOFS: unable to read i-node block 56 [ 359.283138][T12931] isofs_fill_super: get root inode failed 14:38:56 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e0254", 0x17) 14:38:56 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 14:38:56 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd", 0x23) 14:38:56 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:56 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:56 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:56 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 359.768456][T12946] loop4: detected capacity change from 0 to 224 14:38:56 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:56 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f0000000400), 0x0, &(0x7f00000004c0)={0x9a}, 0x0, 0x0) 14:38:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000080)=ANY=[@ANYBLOB="80000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000030000004400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="e9ff0000", @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100cb"], 0x80}}, 0x0) 14:38:56 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:56 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 359.916536][T12960] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 359.962292][T12960] nbd: must specify a device to reconfigure [ 359.981318][T12963] loop4: detected capacity change from 0 to 224 14:38:57 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e0254", 0x17) 14:38:57 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:57 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:57 executing program 0: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:57 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(0xffffffffffffffff, 0x5437, 0x1) 14:38:57 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 14:38:57 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x70, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:38:57 executing program 0: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) [ 360.739444][T12974] loop4: detected capacity change from 0 to 224 14:38:57 executing program 2: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) 14:38:57 executing program 2: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) [ 360.885604][ T3639] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:38:57 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(0xffffffffffffffff, 0x5437, 0x1) [ 360.930225][T12989] loop4: detected capacity change from 0 to 224 14:38:58 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e0254", 0x17) 14:38:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:58 executing program 2: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) 14:38:58 executing program 0: syz_emit_ethernet(0x9e, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}]}}}}}}, 0x0) 14:38:58 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2a82c7c39de87e9f, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(0xffffffffffffffff, 0x5437, 0x1) 14:38:58 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x800080, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x41c201) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000002580)=ANY=[], 0x16) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 14:38:58 executing program 2: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {}]}}}}}}, 0x0) 14:38:58 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b82c48", 0x97d08) [ 361.622476][T13002] loop4: detected capacity change from 0 to 224 14:38:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2a", 0x85, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:58 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b82c48", 0x97d08) 14:38:58 executing program 2: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {}]}}}}}}, 0x0) 14:38:58 executing program 3: unshare(0x48000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) [ 361.804881][T13016] loop4: detected capacity change from 0 to 224 14:38:59 executing program 1: unshare(0x48000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:59 executing program 2: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {}]}}}}}}, 0x0) 14:38:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b82c48", 0x97d08) 14:38:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:59 executing program 2: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90b"}]}}}}}}, 0x0) 14:38:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="0553ad72e4a6bd03194e1b125e9cd0a9416df02e0e025410a7248d6813e4fe7b19c1bd5338e3ee9966b568b82c48", 0x97d08) 14:38:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000080)=ANY=[@ANYBLOB="80000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000030000004400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="e9ff0000", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100"], 0x80}}, 0x0) 14:38:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:59 executing program 2: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90b"}]}}}}}}, 0x0) 14:38:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[]) [ 362.687809][T13043] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 362.707737][T13043] block nbd0: not configured, cannot reconfigure 14:38:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 1) 14:38:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000080)=ANY=[@ANYBLOB="80000000", @ANYRES16, @ANYBLOB="01000000000000000000030000004400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="e9ff0000", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100cbee9b92"], 0x80}}, 0x0) 14:38:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:38:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) (fail_nth: 1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:38:59 executing program 2: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90b"}]}}}}}}, 0x0) 14:38:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:38:59 executing program 2: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90bddee"}]}}}}}}, 0x0) 14:38:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) [ 362.834905][T13052] FAULT_INJECTION: forcing a failure. [ 362.834905][T13052] name failslab, interval 1, probability 0, space 0, times 1 [ 362.855623][T13057] loop4: detected capacity change from 0 to 136 14:38:59 executing program 0: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="0100004e990000c4"]) [ 362.901058][T13059] FAULT_INJECTION: forcing a failure. [ 362.901058][T13059] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 362.924275][T13052] CPU: 1 PID: 13052 Comm: syz-executor.5 Not tainted 5.18.0-rc7-syzkaller #0 [ 362.933269][T13052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.943430][T13052] Call Trace: [ 362.946726][T13052] [ 362.949668][T13052] dump_stack_lvl+0xcd/0x134 [ 362.954315][T13052] should_fail.cold+0x5/0xa [ 362.958846][T13052] ? kvmalloc_node+0x3e/0x190 [ 362.963543][T13052] should_failslab+0x5/0x10 [ 362.968073][T13052] __kmalloc_node+0x75/0x390 [ 362.972694][T13052] kvmalloc_node+0x3e/0x190 [ 362.977299][T13052] file_tty_write.constprop.0+0x67b/0x900 [ 362.983047][T13052] ? n_tty_check_unthrottle+0x440/0x440 [ 362.988621][T13052] new_sync_write+0x38a/0x560 [ 362.993324][T13052] ? new_sync_read+0x5f0/0x5f0 [ 362.998117][T13052] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 363.004380][T13052] ? security_file_permission+0xab/0xd0 [ 363.009962][T13052] vfs_write+0x7c0/0xac0 [ 363.014225][T13052] ksys_write+0x127/0x250 [ 363.018573][T13052] ? __ia32_sys_read+0xb0/0xb0 [ 363.023362][T13052] ? syscall_enter_from_user_mode+0x21/0x70 [ 363.029278][T13052] do_syscall_64+0x35/0xb0 [ 363.029363][T13052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 363.029386][T13052] RIP: 0033:0x7f9fd1c890e9 14:38:59 executing program 2: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90bddee"}]}}}}}}, 0x0) 14:38:59 executing program 2: syz_emit_ethernet(0xa5, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6f, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000000000"}, {0x0, 0x0, "5df90bddee"}]}}}}}}, 0x0) 14:38:59 executing program 2: syz_emit_ethernet(0x98, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x62, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 363.044096][T13052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 363.051286][T13057] isofs_fill_super: get root inode failed [ 363.063720][T13052] RSP: 002b:00007f9fd2d4f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 363.063747][T13052] RAX: ffffffffffffffda RBX: 00007f9fd1d9bf60 RCX: 00007f9fd1c890e9 [ 363.063760][T13052] RDX: 00000000fffffedf RSI: 0000000020000000 RDI: 0000000000000004 [ 363.063773][T13052] RBP: 00007f9fd2d4f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 363.063786][T13052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.063797][T13052] R13: 00007ffcd7a9ae7f R14: 00007f9fd2d4f300 R15: 0000000000022000 [ 363.063822][T13052] [ 363.098581][T13059] CPU: 1 PID: 13059 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 363.130191][T13059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.140256][T13059] Call Trace: [ 363.143538][T13059] [ 363.146481][T13059] dump_stack_lvl+0xcd/0x134 [ 363.151078][T13059] should_fail.cold+0x5/0xa [ 363.155591][T13059] _copy_from_user+0x2a/0x170 [ 363.160281][T13059] __copy_msghdr_from_user+0x91/0x4b0 [ 363.165673][T13059] ? __ia32_sys_shutdown+0x70/0x70 [ 363.171055][T13059] ? __lock_acquire+0xbca/0x56c0 [ 363.176004][T13059] sendmsg_copy_msghdr+0xa1/0x160 [ 363.181283][T13059] ? do_recvmmsg+0x6d0/0x6d0 [ 363.186221][T13059] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 363.192304][T13059] ? _parse_integer+0x30/0x30 [ 363.196996][T13059] ___sys_sendmsg+0xc6/0x170 [ 363.201594][T13059] ? sendmsg_copy_msghdr+0x160/0x160 [ 363.206981][T13059] ? __fget_files+0x264/0x470 [ 363.211665][T13059] ? lock_downgrade+0x6e0/0x6e0 [ 363.216534][T13059] ? __fget_files+0x286/0x470 [ 363.221223][T13059] ? __fget_light+0xea/0x270 [ 363.225829][T13059] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 363.232236][T13059] __sys_sendmsg+0xe5/0x1b0 [ 363.237013][T13059] ? __sys_sendmsg_sock+0x30/0x30 [ 363.242048][T13059] ? syscall_enter_from_user_mode+0x21/0x70 [ 363.248144][T13059] do_syscall_64+0x35/0xb0 [ 363.248236][ T3712] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 363.252588][T13059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 363.252624][T13059] RIP: 0033:0x7f18552890e9 [ 363.252642][T13059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 363.252661][T13059] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:39:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 2) 14:39:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:39:00 executing program 2: syz_emit_ethernet(0x98, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x62, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) (fail_nth: 2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) [ 363.298460][T13059] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 363.306443][T13059] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 363.314503][T13059] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 363.322471][T13059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.330529][T13059] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 363.338853][T13059] [ 363.386116][T13080] FAULT_INJECTION: forcing a failure. [ 363.386116][T13080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 363.386274][T13079] FAULT_INJECTION: forcing a failure. [ 363.386274][T13079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 363.405447][T13080] CPU: 1 PID: 13080 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 363.421279][T13080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.431424][T13080] Call Trace: [ 363.434696][T13080] [ 363.437615][T13080] dump_stack_lvl+0xcd/0x134 [ 363.442222][T13080] should_fail.cold+0x5/0xa [ 363.446731][T13080] _copy_from_user+0x2a/0x170 [ 363.451419][T13080] iovec_from_user+0x149/0x3a0 [ 363.456272][T13080] ? _copy_from_user+0xf9/0x170 [ 363.461128][T13080] __import_iovec+0x65/0x5d0 [ 363.465736][T13080] import_iovec+0x10c/0x150 [ 363.470243][T13080] sendmsg_copy_msghdr+0x12d/0x160 [ 363.475358][T13080] ? do_recvmmsg+0x6d0/0x6d0 [ 363.479938][T13080] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 363.485913][T13080] ? _parse_integer+0x30/0x30 [ 363.490596][T13080] ___sys_sendmsg+0xc6/0x170 [ 363.495365][T13080] ? sendmsg_copy_msghdr+0x160/0x160 [ 363.500643][T13080] ? __fget_files+0x264/0x470 [ 363.505323][T13080] ? lock_downgrade+0x6e0/0x6e0 [ 363.510175][T13080] ? __fget_files+0x286/0x470 [ 363.514856][T13080] ? __fget_light+0xea/0x270 [ 363.519444][T13080] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 363.525690][T13080] __sys_sendmsg+0xe5/0x1b0 [ 363.530189][T13080] ? __sys_sendmsg_sock+0x30/0x30 [ 363.535215][T13080] ? syscall_enter_from_user_mode+0x21/0x70 [ 363.541106][T13080] do_syscall_64+0x35/0xb0 [ 363.545523][T13080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 363.551415][T13080] RIP: 0033:0x7f18552890e9 [ 363.555824][T13080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 363.575432][T13080] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.583849][T13080] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 363.591822][T13080] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 363.599783][T13080] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 363.607748][T13080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.615713][T13080] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 363.623698][T13080] [ 363.633039][T13079] CPU: 1 PID: 13079 Comm: syz-executor.5 Not tainted 5.18.0-rc7-syzkaller #0 [ 363.641846][T13079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.651911][T13079] Call Trace: [ 363.655196][T13079] [ 363.658136][T13079] dump_stack_lvl+0xcd/0x134 [ 363.662747][T13079] should_fail.cold+0x5/0xa [ 363.667287][T13079] _copy_from_iter+0x389/0x15a0 [ 363.672167][T13079] ? _copy_from_iter_nocache+0x1510/0x1510 [ 363.677995][T13079] ? rcu_read_lock_sched_held+0x3a/0x70 [ 363.683561][T13079] ? kfree+0x1ed/0x4d0 [ 363.687648][T13079] ? rcu_read_lock_sched_held+0x3a/0x70 [ 363.693215][T13079] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 363.699478][T13079] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 363.705741][T13079] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 363.712007][T13079] ? __phys_addr+0xc4/0x140 [ 363.716518][T13079] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 363.722761][T13079] ? __phys_addr_symbol+0x2c/0x70 [ 363.727804][T13079] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 363.733520][T13079] ? __check_object_size+0x16c/0x4f0 [ 363.738816][T13079] file_tty_write.constprop.0+0x4cf/0x900 [ 363.744540][T13079] ? n_tty_check_unthrottle+0x440/0x440 [ 363.750083][T13079] new_sync_write+0x38a/0x560 [ 363.754750][T13079] ? new_sync_read+0x5f0/0x5f0 [ 363.759511][T13079] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 363.765738][T13079] ? security_file_permission+0xab/0xd0 [ 363.771279][T13079] vfs_write+0x7c0/0xac0 [ 363.775517][T13079] ksys_write+0x127/0x250 [ 363.779839][T13079] ? __ia32_sys_read+0xb0/0xb0 [ 363.784592][T13079] ? syscall_enter_from_user_mode+0x21/0x70 [ 363.790476][T13079] do_syscall_64+0x35/0xb0 [ 363.794886][T13079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 363.800857][T13079] RIP: 0033:0x7f9fd1c890e9 [ 363.805258][T13079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 363.824858][T13079] RSP: 002b:00007f9fd2d4f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:39:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:39:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:39:00 executing program 2: syz_emit_ethernet(0x98, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x62, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 3) [ 363.833269][T13079] RAX: ffffffffffffffda RBX: 00007f9fd1d9bf60 RCX: 00007f9fd1c890e9 [ 363.841235][T13079] RDX: 00000000fffffedf RSI: 0000000020000000 RDI: 0000000000000004 [ 363.849191][T13079] RBP: 00007f9fd2d4f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 363.857149][T13079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.865104][T13079] R13: 00007ffcd7a9ae7f R14: 00007f9fd2d4f300 R15: 0000000000022000 [ 363.873074][T13079] [ 363.903694][T13086] loop4: detected capacity change from 0 to 136 [ 363.915769][T13087] FAULT_INJECTION: forcing a failure. [ 363.915769][T13087] name failslab, interval 1, probability 0, space 0, times 0 [ 363.940988][T13087] CPU: 0 PID: 13087 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 363.949877][T13087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.959931][T13087] Call Trace: [ 363.963211][T13087] [ 363.966131][T13087] dump_stack_lvl+0xcd/0x134 [ 363.970726][T13087] should_fail.cold+0x5/0xa [ 363.975231][T13087] should_failslab+0x5/0x10 [ 363.979730][T13087] kmem_cache_alloc_node+0x65/0x3f0 [ 363.985023][T13087] ? __alloc_skb+0x215/0x340 [ 363.989620][T13087] __alloc_skb+0x215/0x340 [ 363.994039][T13087] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 364.000282][T13087] netlink_sendmsg+0x98f/0xe00 [ 364.005061][T13087] ? netlink_unicast+0x7f0/0x7f0 [ 364.010003][T13087] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 364.016243][T13087] ? netlink_unicast+0x7f0/0x7f0 [ 364.021267][T13087] sock_sendmsg+0xcf/0x120 [ 364.025686][T13087] ____sys_sendmsg+0x6e2/0x800 [ 364.030447][T13087] ? kernel_sendmsg+0x50/0x50 [ 364.035121][T13087] ? do_recvmmsg+0x6d0/0x6d0 [ 364.039707][T13087] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 364.045691][T13087] ? _parse_integer+0x30/0x30 [ 364.050373][T13087] ___sys_sendmsg+0xf3/0x170 [ 364.054955][T13087] ? sendmsg_copy_msghdr+0x160/0x160 [ 364.060236][T13087] ? lock_downgrade+0x6e0/0x6e0 [ 364.065093][T13087] ? __fget_files+0x286/0x470 [ 364.069768][T13087] ? __fget_light+0xea/0x270 [ 364.074354][T13087] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 364.080589][T13087] __sys_sendmsg+0xe5/0x1b0 [ 364.085084][T13087] ? __sys_sendmsg_sock+0x30/0x30 [ 364.090106][T13087] ? syscall_enter_from_user_mode+0x21/0x70 [ 364.095997][T13087] do_syscall_64+0x35/0xb0 [ 364.100409][T13087] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 364.106295][T13087] RIP: 0033:0x7f18552890e9 [ 364.110699][T13087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 364.130305][T13087] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.138713][T13087] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 364.146671][T13087] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 364.154631][T13087] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 364.162598][T13087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.170562][T13087] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 364.178538][T13087] [ 364.196830][T13086] isofs_fill_super: get root inode failed [ 364.358556][ T3712] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 364.367723][ T3712] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 364.376063][ T3712] usb 1-1: Product: syz [ 364.380307][ T3712] usb 1-1: Manufacturer: syz [ 364.384915][ T3712] usb 1-1: SerialNumber: syz [ 364.439232][ T3712] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 365.008251][ T3707] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 365.228183][ C0] usb 1-1: ath: unknown panic pattern! [ 365.414238][ T6] usb 1-1: USB disconnect, device number 15 14:39:02 executing program 0: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="0100004e990000c4"]) 14:39:02 executing program 2: syz_emit_ethernet(0x9a, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x64, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) (fail_nth: 3) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:39:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:39:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 4) 14:39:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:39:02 executing program 2: syz_emit_ethernet(0x9a, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x64, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 365.936176][T13096] FAULT_INJECTION: forcing a failure. [ 365.936176][T13096] name failslab, interval 1, probability 0, space 0, times 0 [ 365.946335][T13097] loop4: detected capacity change from 0 to 136 [ 365.969621][T13099] FAULT_INJECTION: forcing a failure. [ 365.969621][T13099] name failslab, interval 1, probability 0, space 0, times 0 [ 365.969927][T13099] [ 365.969933][T13099] ====================================================== [ 365.969938][T13099] WARNING: possible circular locking dependency detected [ 365.969943][T13099] 5.18.0-rc7-syzkaller #0 Not tainted [ 365.969951][T13099] ------------------------------------------------------ [ 365.969955][T13099] syz-executor.5/13099 is trying to acquire lock: [ 365.969966][T13099] ffffffff8bc90700 (console_owner){..-.}-{0:0}, at: console_unlock+0x35e/0xdd0 [ 365.970008][T13099] [ 365.970008][T13099] but task is already holding lock: [ 365.970011][T13099] ffff888076547958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xea/0x1e0 [ 365.970046][T13099] [ 365.970046][T13099] which lock already depends on the new lock. [ 365.970046][T13099] [ 365.970050][T13099] [ 365.970050][T13099] the existing dependency chain (in reverse order) is: [ 365.970055][T13099] [ 365.970055][T13099] -> #2 (&port->lock){-.-.}-{2:2}: [ 365.970073][T13099] _raw_spin_lock_irqsave+0x39/0x50 [ 365.970092][T13099] tty_port_tty_get+0x1f/0x100 [ 365.970108][T13099] tty_port_default_wakeup+0x11/0x40 [ 365.970124][T13099] serial8250_tx_chars+0x4f3/0xa50 [ 365.970144][T13099] serial8250_handle_irq.part.0+0x328/0x3d0 [ 365.970164][T13099] serial8250_default_handle_irq+0xb2/0x220 [ 365.970184][T13099] serial8250_interrupt+0xfd/0x200 [ 365.970200][T13099] __handle_irq_event_percpu+0x22b/0x880 [ 365.970215][T13099] handle_irq_event+0xa7/0x1e0 [ 365.970229][T13099] handle_edge_irq+0x25f/0xd00 [ 365.970245][T13099] __common_interrupt+0x9d/0x210 [ 365.970260][T13099] common_interrupt+0xa4/0xc0 [ 365.970274][T13099] asm_common_interrupt+0x1e/0x40 [ 365.970291][T13099] acpi_idle_do_entry+0x1c6/0x250 [ 365.970306][T13099] acpi_idle_enter+0x361/0x500 [ 365.970320][T13099] cpuidle_enter_state+0x1b1/0xc80 [ 365.970335][T13099] cpuidle_enter+0x4a/0xa0 [ 365.970348][T13099] do_idle+0x3e8/0x590 [ 365.970361][T13099] cpu_startup_entry+0x14/0x20 [ 365.970375][T13099] rest_init+0x169/0x270 [ 365.970389][T13099] arch_call_rest_init+0xf/0x14 [ 365.970405][T13099] start_kernel+0x47f/0x4a0 [ 365.970418][T13099] secondary_startup_64_no_verify+0xc3/0xcb [ 365.970437][T13099] [ 365.970437][T13099] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 365.970456][T13099] _raw_spin_lock_irqsave+0x39/0x50 [ 365.970472][T13099] serial8250_console_write+0x9cb/0xc30 [ 365.970492][T13099] console_unlock+0x9bc/0xdd0 [ 365.970509][T13099] vprintk_emit+0x1b4/0x5f0 [ 365.970526][T13099] vprintk+0x80/0x90 [ 365.970542][T13099] _printk+0xba/0xed [ 365.970558][T13099] register_console+0x410/0x7c0 [ 365.970575][T13099] univ8250_console_init+0x3a/0x46 [ 365.970593][T13099] console_init+0x3c1/0x58d [ 365.970611][T13099] start_kernel+0x30b/0x4a0 [ 365.970624][T13099] secondary_startup_64_no_verify+0xc3/0xcb [ 365.970642][T13099] [ 365.970642][T13099] -> #0 (console_owner){..-.}-{0:0}: [ 365.970660][T13099] __lock_acquire+0x2ac6/0x56c0 [ 365.970677][T13099] lock_acquire+0x1ab/0x510 [ 365.970694][T13099] console_unlock+0x3b1/0xdd0 [ 365.970711][T13099] vprintk_emit+0x1b4/0x5f0 [ 365.970728][T13099] vprintk+0x80/0x90 [ 365.970745][T13099] _printk+0xba/0xed [ 365.970759][T13099] should_fail+0x472/0x5a0 [ 365.970774][T13099] should_failslab+0x5/0x10 [ 365.970798][T13099] __kmalloc+0x7e/0x350 [ 365.970812][T13099] tty_buffer_alloc+0x23f/0x2a0 [ 365.970827][T13099] __tty_buffer_request_room+0x156/0x2a0 [ 365.970843][T13099] tty_insert_flip_string_fixed_flag+0x8c/0x240 [ 365.970861][T13099] pty_write+0x11c/0x1e0 [ 365.970877][T13099] tty_put_char+0x122/0x150 [ 365.970893][T13099] do_output_char+0x155/0x850 [ 365.970907][T13099] n_tty_write+0x4c3/0xfc0 [ 365.970920][T13099] file_tty_write.constprop.0+0x520/0x900 [ 365.970939][T13099] new_sync_write+0x38a/0x560 [ 365.970953][T13099] vfs_write+0x7c0/0xac0 [ 365.970966][T13099] ksys_write+0x127/0x250 [ 365.970979][T13099] do_syscall_64+0x35/0xb0 [ 365.970997][T13099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 365.971015][T13099] [ 365.971015][T13099] other info that might help us debug this: [ 365.971015][T13099] [ 365.971019][T13099] Chain exists of: [ 365.971019][T13099] console_owner --> &port_lock_key --> &port->lock [ 365.971019][T13099] [ 365.971039][T13099] Possible unsafe locking scenario: [ 365.971039][T13099] [ 365.971042][T13099] CPU0 CPU1 [ 365.971045][T13099] ---- ---- [ 365.971049][T13099] lock(&port->lock); [ 365.971056][T13099] lock(&port_lock_key); [ 365.971065][T13099] lock(&port->lock); [ 365.971074][T13099] lock(console_owner); [ 365.971082][T13099] [ 365.971082][T13099] *** DEADLOCK *** [ 365.971082][T13099] [ 365.971085][T13099] 6 locks held by syz-executor.5/13099: [ 365.971094][T13099] #0: ffff88807d26a098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 [ 365.971129][T13099] #1: ffff88807d26a130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: file_tty_write.constprop.0+0x299/0x900 [ 365.971170][T13099] #2: ffff88807d26a2e8 (&o_tty->termios_rwsem/1){++++}-{3:3}, at: n_tty_write+0x1bf/0xfc0 [ 365.971207][T13099] #3: ffffc90003293378 (&ldata->output_lock){+.+.}-{3:3}, at: n_tty_write+0x4ae/0xfc0 [ 365.971241][T13099] #4: ffff888076547958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xea/0x1e0 [ 365.971277][T13099] #5: ffffffff8bd70b40 (console_lock){+.+.}-{0:0}, at: vprintk+0x80/0x90 [ 365.971314][T13099] [ 365.971314][T13099] stack backtrace: [ 365.971318][T13099] CPU: 0 PID: 13099 Comm: syz-executor.5 Not tainted 5.18.0-rc7-syzkaller #0 [ 365.971335][T13099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.971344][T13099] Call Trace: [ 365.971348][T13099] [ 365.971354][T13099] dump_stack_lvl+0xcd/0x134 [ 365.971375][T13099] check_noncircular+0x25f/0x2e0 [ 365.971393][T13099] ? filter_irq_stacks+0x90/0x90 [ 365.971413][T13099] ? print_circular_bug+0x1e0/0x1e0 [ 365.971432][T13099] ? pointer+0x950/0x950 [ 365.971450][T13099] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 365.971468][T13099] ? add_lock_to_list.constprop.0+0x185/0x370 [ 365.971489][T13099] __lock_acquire+0x2ac6/0x56c0 [ 365.971511][T13099] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 365.971531][T13099] ? msg_add_ext_text+0x1d0/0x1d0 [ 365.971552][T13099] lock_acquire+0x1ab/0x510 [ 365.971570][T13099] ? console_unlock+0x35e/0xdd0 [ 365.971589][T13099] ? lock_release+0x720/0x720 [ 365.971607][T13099] ? lock_downgrade+0x6e0/0x6e0 [ 365.971625][T13099] ? do_raw_spin_lock+0x120/0x2a0 [ 365.971645][T13099] ? rwlock_bug.part.0+0x90/0x90 [ 365.971664][T13099] ? prb_final_commit+0x64/0xa0 [ 365.971685][T13099] console_unlock+0x3b1/0xdd0 [ 365.971703][T13099] ? console_unlock+0x35e/0xdd0 [ 365.971723][T13099] ? devkmsg_read+0x730/0x730 [ 365.971742][T13099] ? lock_release+0x720/0x720 [ 365.971763][T13099] ? vprintk+0x80/0x90 [ 365.971782][T13099] vprintk_emit+0x1b4/0x5f0 [ 365.971808][T13099] vprintk+0x80/0x90 [ 365.971829][T13099] _printk+0xba/0xed [ 365.971846][T13099] ? record_print_text.cold+0x16/0x16 [ 365.971865][T13099] ? __lock_acquire+0x163e/0x56c0 [ 365.971884][T13099] ? ___ratelimit+0x222/0x4b0 [ 365.971900][T13099] should_fail+0x472/0x5a0 [ 365.971916][T13099] should_failslab+0x5/0x10 [ 365.971931][T13099] __kmalloc+0x7e/0x350 [ 365.971945][T13099] ? tty_buffer_alloc+0x23f/0x2a0 [ 365.971962][T13099] tty_buffer_alloc+0x23f/0x2a0 [ 365.971980][T13099] __tty_buffer_request_room+0x156/0x2a0 [ 365.971999][T13099] tty_insert_flip_string_fixed_flag+0x8c/0x240 [ 365.972020][T13099] pty_write+0x11c/0x1e0 [ 365.972039][T13099] tty_put_char+0x122/0x150 [ 365.972057][T13099] ? tty_hung_up_p+0x70/0x70 [ 365.972075][T13099] ? mark_held_locks+0x9f/0xe0 [ 365.972094][T13099] do_output_char+0x155/0x850 [ 365.972110][T13099] n_tty_write+0x4c3/0xfc0 [ 365.972128][T13099] ? n_tty_check_unthrottle+0x440/0x440 [ 365.972144][T13099] ? rcu_read_lock_sched_held+0x3a/0x70 [ 365.972163][T13099] ? __init_waitqueue_head+0xd0/0xd0 [ 365.972181][T13099] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 365.972198][T13099] ? __phys_addr+0xc4/0x140 [ 365.972217][T13099] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 365.972233][T13099] ? __phys_addr_symbol+0x2c/0x70 [ 365.972252][T13099] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 365.972268][T13099] ? __check_object_size+0x16c/0x4f0 [ 365.972287][T13099] file_tty_write.constprop.0+0x520/0x900 [ 365.972307][T13099] ? n_tty_check_unthrottle+0x440/0x440 [ 365.972326][T13099] new_sync_write+0x38a/0x560 [ 365.972341][T13099] ? new_sync_read+0x5f0/0x5f0 [ 365.972359][T13099] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 365.972376][T13099] ? security_file_permission+0xab/0xd0 [ 365.972397][T13099] vfs_write+0x7c0/0xac0 [ 365.972413][T13099] ksys_write+0x127/0x250 [ 365.972428][T13099] ? __ia32_sys_read+0xb0/0xb0 [ 365.972444][T13099] ? syscall_enter_from_user_mode+0x21/0x70 [ 365.972463][T13099] do_syscall_64+0x35/0xb0 [ 365.972482][T13099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 365.972501][T13099] RIP: 0033:0x7f9fd1c890e9 [ 365.972514][T13099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 365.972530][T13099] RSP: 002b:00007f9fd2d4f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 365.972545][T13099] RAX: ffffffffffffffda RBX: 00007f9fd1d9bf60 RCX: 00007f9fd1c890e9 [ 365.972556][T13099] RDX: 00000000fffffedf RSI: 0000000020000000 RDI: 0000000000000004 [ 365.972567][T13099] RBP: 00007f9fd2d4f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 365.972577][T13099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.972587][T13099] R13: 00007ffcd7a9ae7f R14: 00007f9fd2d4f300 R15: 0000000000022000 [ 365.972601][T13099] [ 366.932506][T13099] CPU: 0 PID: 13099 Comm: syz-executor.5 Not tainted 5.18.0-rc7-syzkaller #0 [ 366.941252][T13099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.951317][T13099] Call Trace: [ 366.954589][T13099] [ 366.957500][T13099] dump_stack_lvl+0xcd/0x134 [ 366.962087][T13099] should_fail.cold+0x5/0xa [ 366.966577][T13099] should_failslab+0x5/0x10 [ 366.971068][T13099] __kmalloc+0x7e/0x350 [ 366.975208][T13099] ? tty_buffer_alloc+0x23f/0x2a0 [ 366.980222][T13099] tty_buffer_alloc+0x23f/0x2a0 [ 366.985059][T13099] __tty_buffer_request_room+0x156/0x2a0 [ 366.990679][T13099] tty_insert_flip_string_fixed_flag+0x8c/0x240 [ 366.996911][T13099] pty_write+0x11c/0x1e0 [ 367.001141][T13099] tty_put_char+0x122/0x150 [ 367.005636][T13099] ? tty_hung_up_p+0x70/0x70 [ 367.010210][T13099] ? mark_held_locks+0x9f/0xe0 [ 367.014960][T13099] do_output_char+0x155/0x850 [ 367.019622][T13099] n_tty_write+0x4c3/0xfc0 [ 367.024024][T13099] ? n_tty_check_unthrottle+0x440/0x440 [ 367.029551][T13099] ? rcu_read_lock_sched_held+0x3a/0x70 [ 367.035084][T13099] ? __init_waitqueue_head+0xd0/0xd0 [ 367.040354][T13099] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.046579][T13099] ? __phys_addr+0xc4/0x140 [ 367.051069][T13099] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.057292][T13099] ? __phys_addr_symbol+0x2c/0x70 [ 367.062311][T13099] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 367.068015][T13099] ? __check_object_size+0x16c/0x4f0 [ 367.073318][T13099] file_tty_write.constprop.0+0x520/0x900 [ 367.079031][T13099] ? n_tty_check_unthrottle+0x440/0x440 [ 367.084564][T13099] new_sync_write+0x38a/0x560 [ 367.089229][T13099] ? new_sync_read+0x5f0/0x5f0 [ 367.093979][T13099] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.100205][T13099] ? security_file_permission+0xab/0xd0 [ 367.105739][T13099] vfs_write+0x7c0/0xac0 [ 367.109973][T13099] ksys_write+0x127/0x250 [ 367.114289][T13099] ? __ia32_sys_read+0xb0/0xb0 [ 367.119042][T13099] ? syscall_enter_from_user_mode+0x21/0x70 [ 367.124923][T13099] do_syscall_64+0x35/0xb0 [ 367.129327][T13099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 367.135208][T13099] RIP: 0033:0x7f9fd1c890e9 [ 367.139608][T13099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 367.159209][T13099] RSP: 002b:00007f9fd2d4f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.167612][T13099] RAX: ffffffffffffffda RBX: 00007f9fd1d9bf60 RCX: 00007f9fd1c890e9 [ 367.175604][T13099] RDX: 00000000fffffedf RSI: 0000000020000000 RDI: 0000000000000004 [ 367.183565][T13099] RBP: 00007f9fd2d4f1d0 R08: 0000000000000000 R09: 0000000000000000 14:39:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) [ 367.191533][T13099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.199489][T13099] R13: 00007ffcd7a9ae7f R14: 00007f9fd2d4f300 R15: 0000000000022000 [ 367.207451][T13099] [ 367.213402][ T3707] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 367.214346][T13096] CPU: 1 PID: 13096 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 367.229021][T13096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.239077][T13096] Call Trace: [ 367.242359][T13096] [ 367.244402][ T3707] ath9k_htc: Failed to initialize the device [ 367.245284][T13096] dump_stack_lvl+0xcd/0x134 [ 367.255853][T13096] should_fail.cold+0x5/0xa [ 367.260376][T13096] should_failslab+0x5/0x10 [ 367.264894][T13096] __kmalloc_node_track_caller+0x7d/0x360 [ 367.270625][T13096] ? netlink_sendmsg+0x98f/0xe00 [ 367.275739][T13096] __alloc_skb+0xde/0x340 [ 367.280062][T13096] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.286381][T13096] netlink_sendmsg+0x98f/0xe00 [ 367.291146][T13096] ? netlink_unicast+0x7f0/0x7f0 [ 367.296077][T13096] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.302306][T13096] ? netlink_unicast+0x7f0/0x7f0 [ 367.307239][T13096] sock_sendmsg+0xcf/0x120 [ 367.311649][T13096] ____sys_sendmsg+0x6e2/0x800 [ 367.316405][T13096] ? kernel_sendmsg+0x50/0x50 [ 367.321074][T13096] ? do_recvmmsg+0x6d0/0x6d0 [ 367.325654][T13096] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 367.331848][T13096] ? _parse_integer+0x30/0x30 [ 367.336531][T13096] ___sys_sendmsg+0xf3/0x170 [ 367.341111][T13096] ? sendmsg_copy_msghdr+0x160/0x160 [ 367.346387][T13096] ? lock_downgrade+0x6e0/0x6e0 [ 367.351238][T13096] ? __fget_files+0x286/0x470 [ 367.355912][T13096] ? __fget_light+0xea/0x270 [ 367.360499][T13096] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.366738][T13096] __sys_sendmsg+0xe5/0x1b0 [ 367.371235][T13096] ? __sys_sendmsg_sock+0x30/0x30 [ 367.376254][T13096] ? syscall_enter_from_user_mode+0x21/0x70 [ 367.382135][T13096] do_syscall_64+0x35/0xb0 [ 367.386550][T13096] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 367.392433][T13096] RIP: 0033:0x7f18552890e9 [ 367.396835][T13096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 367.416431][T13096] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 367.424841][T13096] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 367.432799][T13096] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 14:39:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) [ 367.440757][T13096] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 367.448717][T13096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.456674][T13096] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 367.464638][T13096] 14:39:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) (fail_nth: 4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:39:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x1) [ 367.487865][ T6] usb 1-1: ath9k_htc: USB layer deinitialized [ 367.510186][T13110] FAULT_INJECTION: forcing a failure. [ 367.510186][T13110] name failslab, interval 1, probability 0, space 0, times 0 [ 367.522812][T13110] CPU: 1 PID: 13110 Comm: syz-executor.5 Not tainted 5.18.0-rc7-syzkaller #0 [ 367.531569][T13110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.541702][T13110] Call Trace: [ 367.544969][T13110] [ 367.547882][T13110] dump_stack_lvl+0xcd/0x134 [ 367.552473][T13110] should_fail.cold+0x5/0xa [ 367.556969][T13110] ? lock_release+0x522/0x720 [ 367.561641][T13110] should_failslab+0x5/0x10 [ 367.566138][T13110] __kmalloc+0x7e/0x350 [ 367.570292][T13110] ? tty_buffer_alloc+0x23f/0x2a0 [ 367.575320][T13110] tty_buffer_alloc+0x23f/0x2a0 [ 367.580166][T13110] __tty_buffer_request_room+0x156/0x2a0 [ 367.585789][T13110] tty_insert_flip_string_fixed_flag+0x8c/0x240 [ 367.592031][T13110] pty_write+0x11c/0x1e0 [ 367.596272][T13110] ? ptmx_open+0x360/0x360 [ 367.600689][T13110] n_tty_write+0x410/0xfc0 [ 367.605096][T13110] ? n_tty_check_unthrottle+0x440/0x440 [ 367.610631][T13110] ? rcu_read_lock_sched_held+0xd/0x70 [ 367.616084][T13110] ? __init_waitqueue_head+0xd0/0xd0 [ 367.621360][T13110] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.627590][T13110] ? __phys_addr+0xc4/0x140 [ 367.632089][T13110] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.638322][T13110] ? __phys_addr_symbol+0x2c/0x70 [ 367.643338][T13110] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 367.649041][T13110] ? __check_object_size+0x16c/0x4f0 [ 367.654316][T13110] file_tty_write.constprop.0+0x520/0x900 [ 367.660028][T13110] ? n_tty_check_unthrottle+0x440/0x440 [ 367.665564][T13110] new_sync_write+0x38a/0x560 [ 367.670230][T13110] ? new_sync_read+0x5f0/0x5f0 [ 367.674983][T13110] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.681210][T13110] ? security_file_permission+0xab/0xd0 [ 367.686752][T13110] vfs_write+0x7c0/0xac0 [ 367.690987][T13110] ksys_write+0x127/0x250 [ 367.695299][T13110] ? __ia32_sys_read+0xb0/0xb0 [ 367.700048][T13110] ? syscall_enter_from_user_mode+0x21/0x70 [ 367.705928][T13110] do_syscall_64+0x35/0xb0 [ 367.710539][T13110] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 367.716427][T13110] RIP: 0033:0x7f9fd1c890e9 [ 367.720827][T13110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 367.740426][T13110] RSP: 002b:00007f9fd2d4f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.748830][T13110] RAX: ffffffffffffffda RBX: 00007f9fd1d9bf60 RCX: 00007f9fd1c890e9 [ 367.756795][T13110] RDX: 00000000fffffedf RSI: 0000000020000000 RDI: 0000000000000004 [ 367.764756][T13110] RBP: 00007f9fd2d4f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 367.772717][T13110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.780676][T13110] R13: 00007ffcd7a9ae7f R14: 00007f9fd2d4f300 R15: 0000000000022000 14:39:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 5) [ 367.788811][T13110] [ 367.805626][T13097] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 367.820861][T13097] isofs_fill_super: get root inode failed [ 367.820996][T13113] FAULT_INJECTION: forcing a failure. [ 367.820996][T13113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.840842][T13113] CPU: 1 PID: 13113 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 367.849620][T13113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.859670][T13113] Call Trace: [ 367.862939][T13113] [ 367.865850][T13113] dump_stack_lvl+0xcd/0x134 [ 367.870436][T13113] should_fail.cold+0x5/0xa [ 367.874935][T13113] _copy_from_iter+0x389/0x15a0 [ 367.879774][T13113] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 367.885921][T13113] ? _copy_from_iter_nocache+0x1510/0x1510 [ 367.891745][T13113] ? __check_object_size+0x206/0x4f0 [ 367.897022][T13113] ? __check_object_size+0x482/0x4f0 [ 367.902297][T13113] ? kcov_close+0x10/0x10 [ 367.906616][T13113] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.912843][T13113] ? __phys_addr_symbol+0x2c/0x70 [ 367.917857][T13113] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 367.923562][T13113] ? __check_object_size+0x16c/0x4f0 [ 367.928837][T13113] netlink_sendmsg+0x86c/0xe00 [ 367.933593][T13113] ? netlink_unicast+0x7f0/0x7f0 [ 367.938519][T13113] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.944742][T13113] ? netlink_unicast+0x7f0/0x7f0 [ 367.949667][T13113] sock_sendmsg+0xcf/0x120 [ 367.954071][T13113] ____sys_sendmsg+0x6e2/0x800 [ 367.958822][T13113] ? kernel_sendmsg+0x50/0x50 [ 367.963484][T13113] ? do_recvmmsg+0x6d0/0x6d0 [ 367.968061][T13113] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.974291][T13113] ? _parse_integer+0x30/0x30 [ 367.978967][T13113] ? rcu_read_lock_sched_held+0xd/0x70 [ 367.984413][T13113] ? lock_release+0x522/0x720 [ 367.989075][T13113] ? __might_fault+0xd1/0x170 [ 367.993740][T13113] ___sys_sendmsg+0xf3/0x170 [ 367.998318][T13113] ? sendmsg_copy_msghdr+0x160/0x160 [ 368.003586][T13113] ? lock_release+0x522/0x720 [ 368.008247][T13113] ? lock_downgrade+0x6e0/0x6e0 [ 368.013086][T13113] ? rcu_read_lock_sched_held+0xd/0x70 [ 368.018531][T13113] ? lock_release+0x522/0x720 [ 368.023196][T13113] ? get_pid_task+0xe8/0x210 [ 368.027769][T13113] ? ksys_write+0x20c/0x250 [ 368.032256][T13113] ? __fget_files+0x286/0x470 [ 368.036924][T13113] ? __fget_light+0xea/0x270 [ 368.041497][T13113] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 368.047723][T13113] __sys_sendmsg+0xe5/0x1b0 [ 368.052212][T13113] ? __sys_sendmsg_sock+0x30/0x30 [ 368.057222][T13113] ? syscall_enter_from_user_mode+0x21/0x70 [ 368.063103][T13113] ? trace_hardirqs_on+0x5b/0x1c0 [ 368.068117][T13113] do_syscall_64+0x35/0xb0 [ 368.072522][T13113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 368.078401][T13113] RIP: 0033:0x7f18552890e9 [ 368.082799][T13113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 368.102394][T13113] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 368.110887][T13113] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 368.118930][T13113] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 368.127006][T13113] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 368.134965][T13113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.142927][T13113] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 368.150892][T13113] [ 368.348164][ T6] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 368.868266][ T6] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 368.877392][ T6] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 368.885423][ T6] usb 1-1: Product: syz [ 368.889611][ T6] usb 1-1: Manufacturer: syz [ 368.894469][ T6] usb 1-1: SerialNumber: syz [ 368.940761][ T6] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 369.508347][ T6] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 369.718152][ C0] usb 1-1: ath: unknown panic pattern! [ 369.910958][T12857] usb 1-1: USB disconnect, device number 16 14:39:07 executing program 0: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="0100004e990000c4"]) 14:39:07 executing program 2: syz_emit_ethernet(0x9a, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x64, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) (fail_nth: 5) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:39:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:39:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 6) 14:39:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:39:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) ioctl$TCFLSH(r0, 0x5437, 0x1) [ 370.422724][T13120] FAULT_INJECTION: forcing a failure. [ 370.422724][T13120] name failslab, interval 1, probability 0, space 0, times 0 [ 370.427428][T13124] loop4: detected capacity change from 0 to 224 [ 370.447200][T13123] FAULT_INJECTION: forcing a failure. [ 370.447200][T13123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.466382][T13120] CPU: 1 PID: 13120 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 370.475188][T13120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.485249][T13120] Call Trace: [ 370.488525][T13120] [ 370.491450][T13120] dump_stack_lvl+0xcd/0x134 [ 370.496050][T13120] should_fail.cold+0x5/0xa [ 370.500564][T13120] ? __rhashtable_lookup.constprop.0+0x317/0x5e0 [ 370.506912][T13120] ? skb_clone+0x170/0x3c0 [ 370.511334][T13120] should_failslab+0x5/0x10 [ 370.515844][T13120] kmem_cache_alloc+0x5e/0x3b0 [ 370.520616][T13120] skb_clone+0x170/0x3c0 [ 370.524858][T13120] netlink_deliver_tap+0xa89/0xc40 [ 370.529971][T13120] netlink_unicast+0x5f5/0x7f0 [ 370.534742][T13120] ? netlink_attachskb+0x880/0x880 [ 370.539861][T13120] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.546107][T13120] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.552344][T13120] ? __phys_addr_symbol+0x2c/0x70 [ 370.557369][T13120] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 370.563080][T13120] ? __check_object_size+0x16c/0x4f0 [ 370.568362][T13120] netlink_sendmsg+0x904/0xe00 [ 370.573127][T13120] ? netlink_unicast+0x7f0/0x7f0 [ 370.578061][T13120] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 370.584299][T13120] ? netlink_unicast+0x7f0/0x7f0 [ 370.589232][T13120] sock_sendmsg+0xcf/0x120 [ 370.593642][T13120] ____sys_sendmsg+0x6e2/0x800 [ 370.598396][T13120] ? kernel_sendmsg+0x50/0x50 [ 370.603059][T13120] ? do_recvmmsg+0x6d0/0x6d0 [ 370.607636][T13120] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.613871][T13120] ? _parse_integer+0x30/0x30 [ 370.618544][T13120] ? rcu_read_lock_sched_held+0xd/0x70 [ 370.623995][T13120] ? lock_release+0x522/0x720 [ 370.628663][T13120] ? __might_fault+0xd1/0x170 [ 370.633331][T13120] ___sys_sendmsg+0xf3/0x170 [ 370.637909][T13120] ? sendmsg_copy_msghdr+0x160/0x160 [ 370.643189][T13120] ? lock_release+0x522/0x720 [ 370.647863][T13120] ? lock_downgrade+0x6e0/0x6e0 [ 370.652705][T13120] ? rcu_read_lock_sched_held+0xd/0x70 [ 370.658420][T13120] ? lock_release+0x522/0x720 [ 370.663087][T13120] ? get_pid_task+0xe8/0x210 [ 370.667664][T13120] ? ksys_write+0x20c/0x250 [ 370.672157][T13120] ? __fget_files+0x286/0x470 [ 370.676833][T13120] ? __fget_light+0xea/0x270 [ 370.681415][T13120] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.687651][T13120] __sys_sendmsg+0xe5/0x1b0 [ 370.692147][T13120] ? __sys_sendmsg_sock+0x30/0x30 [ 370.697169][T13120] ? syscall_enter_from_user_mode+0x21/0x70 [ 370.703060][T13120] ? trace_hardirqs_on+0x5b/0x1c0 [ 370.708081][T13120] do_syscall_64+0x35/0xb0 [ 370.712496][T13120] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 370.718605][T13120] RIP: 0033:0x7f18552890e9 [ 370.723009][T13120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 370.742607][T13120] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 370.751014][T13120] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 370.758976][T13120] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 370.766929][T13120] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 370.774885][T13120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.782852][T13120] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 370.790819][T13120] [ 370.794702][ T6] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 370.795504][T13123] CPU: 1 PID: 13123 Comm: syz-executor.5 Not tainted 5.18.0-rc7-syzkaller #0 [ 370.810318][T13123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.820379][T13123] Call Trace: [ 370.821328][ T6] ath9k_htc: Failed to initialize the device [ 370.823747][T13123] [ 370.823756][T13123] dump_stack_lvl+0xcd/0x134 [ 370.823783][T13123] should_fail.cold+0x5/0xa [ 370.839806][T13135] FAULT_INJECTION: forcing a failure. [ 370.839806][T13135] name failslab, interval 1, probability 0, space 0, times 0 [ 370.841718][T13123] _copy_from_iter+0x389/0x15a0 [ 370.841748][T13123] ? _copy_from_iter_nocache+0x1510/0x1510 [ 370.857459][T12857] usb 1-1: ath9k_htc: USB layer deinitialized 14:39:07 executing program 2: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) ioctl$TCFLSH(r0, 0x5437, 0x1) 14:39:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 7) 14:39:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(0xffffffffffffffff, 0x5437, 0x1) [ 370.859154][T13123] ? rcu_read_lock_sched_held+0xd/0x70 [ 370.859184][T13123] ? __init_waitqueue_head+0xd0/0xd0 [ 370.859204][T13123] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.888052][T13123] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.894313][T13123] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.900564][T13123] ? __phys_addr+0xc4/0x140 [ 370.905078][T13123] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.911326][T13123] ? __phys_addr_symbol+0x2c/0x70 [ 370.916362][T13123] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 14:39:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(0xffffffffffffffff, 0x5437, 0x1) [ 370.922086][T13123] ? __check_object_size+0x16c/0x4f0 [ 370.927381][T13123] file_tty_write.constprop.0+0x4cf/0x900 [ 370.933119][T13123] ? n_tty_check_unthrottle+0x440/0x440 [ 370.938680][T13123] new_sync_write+0x38a/0x560 [ 370.943368][T13123] ? new_sync_read+0x5f0/0x5f0 [ 370.948143][T13123] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 370.954394][T13123] ? security_file_permission+0xab/0xd0 [ 370.959954][T13123] vfs_write+0x7c0/0xac0 [ 370.964209][T13123] ksys_write+0x127/0x250 [ 370.968636][T13123] ? __ia32_sys_read+0xb0/0xb0 [ 370.973497][T13123] ? syscall_enter_from_user_mode+0x21/0x70 [ 370.979410][T13123] do_syscall_64+0x35/0xb0 [ 370.983841][T13123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 370.989744][T13123] RIP: 0033:0x7f9fd1c890e9 [ 370.994165][T13123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 371.013783][T13123] RSP: 002b:00007f9fd2d4f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.022199][T13123] RAX: ffffffffffffffda RBX: 00007f9fd1d9bf60 RCX: 00007f9fd1c890e9 [ 371.030175][T13123] RDX: 00000000fffffedf RSI: 0000000020000000 RDI: 0000000000000004 [ 371.038138][T13123] RBP: 00007f9fd2d4f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 371.046092][T13123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.054048][T13123] R13: 00007ffcd7a9ae7f R14: 00007f9fd2d4f300 R15: 0000000000022000 [ 371.062021][T13123] [ 371.069197][T13124] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 371.080110][T13135] CPU: 1 PID: 13135 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 371.088913][T13135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.098974][T13135] Call Trace: [ 371.102245][T13135] [ 371.105157][T13135] dump_stack_lvl+0xcd/0x134 [ 371.109748][T13135] should_fail.cold+0x5/0xa [ 371.114243][T13135] should_failslab+0x5/0x10 [ 371.118736][T13135] kmem_cache_alloc_trace+0x60/0x3f0 [ 371.124099][T13135] ? ip_set_create+0x445/0x1590 [ 371.128946][T13135] ip_set_create+0x445/0x1590 [ 371.133620][T13135] ? ip_set_sockfn_get+0xe60/0xe60 [ 371.138725][T13135] ? __nla_parse+0x3d/0x50 [ 371.143130][T13135] nfnetlink_rcv_msg+0xbc9/0x13f0 [ 371.148151][T13135] ? nfnetlink_net_init+0x380/0x380 [ 371.153351][T13135] ? lock_downgrade+0x6e0/0x6e0 [ 371.158191][T13135] ? nlmon_xmit+0xa4/0xe0 [ 371.162510][T13135] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 371.168742][T13135] ? dev_hard_start_xmit+0x382/0x920 [ 371.174021][T13135] ? __local_bh_enable_ip+0xa0/0x120 [ 371.179294][T13135] ? trace_hardirqs_on+0x5b/0x1c0 [ 371.184307][T13135] ? __dev_queue_xmit+0x1953/0x3920 [ 371.189498][T13135] ? __local_bh_enable_ip+0xa0/0x120 [ 371.194771][T13135] ? __dev_queue_xmit+0xa9b/0x3920 [ 371.199881][T13135] netlink_rcv_skb+0x153/0x420 [ 371.204641][T13135] ? nfnetlink_net_init+0x380/0x380 [ 371.209825][T13135] ? netlink_ack+0xa80/0xa80 [ 371.214402][T13135] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 371.220631][T13135] ? ns_capable+0xd9/0x100 [ 371.225038][T13135] nfnetlink_rcv+0x1ac/0x420 [ 371.229617][T13135] ? nfnetlink_rcv_batch+0x2600/0x2600 [ 371.235061][T13135] ? netlink_deliver_tap+0x1b1/0xc40 [ 371.240342][T13135] netlink_unicast+0x543/0x7f0 [ 371.245131][T13135] ? netlink_attachskb+0x880/0x880 [ 371.250582][T13135] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 371.256817][T13135] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 371.263046][T13135] ? __phys_addr_symbol+0x2c/0x70 [ 371.268065][T13135] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 371.273771][T13135] ? __check_object_size+0x16c/0x4f0 [ 371.279049][T13135] netlink_sendmsg+0x904/0xe00 [ 371.283892][T13135] ? netlink_unicast+0x7f0/0x7f0 [ 371.288816][T13135] ? __sanitizer_cov_trace_pc+0x7/0x60 [ 371.294259][T13135] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 371.300487][T13135] ? netlink_unicast+0x7f0/0x7f0 [ 371.305417][T13135] sock_sendmsg+0xcf/0x120 [ 371.309824][T13135] ____sys_sendmsg+0x6e2/0x800 [ 371.314581][T13135] ? kernel_sendmsg+0x50/0x50 [ 371.319245][T13135] ? do_recvmmsg+0x6d0/0x6d0 [ 371.323819][T13135] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 371.330047][T13135] ? _parse_integer+0x30/0x30 [ 371.334742][T13135] ? rcu_read_lock_sched_held+0xd/0x70 [ 371.340193][T13135] ? lock_release+0x522/0x720 [ 371.344862][T13135] ? __might_fault+0xd1/0x170 [ 371.349531][T13135] ___sys_sendmsg+0xf3/0x170 [ 371.354109][T13135] ? sendmsg_copy_msghdr+0x160/0x160 [ 371.359635][T13135] ? lock_release+0x522/0x720 [ 371.364304][T13135] ? lock_downgrade+0x6e0/0x6e0 [ 371.369142][T13135] ? rcu_read_lock_sched_held+0xd/0x70 [ 371.374593][T13135] ? lock_release+0x522/0x720 [ 371.379264][T13135] ? get_pid_task+0xe8/0x210 [ 371.383847][T13135] ? ksys_write+0x20c/0x250 [ 371.388344][T13135] ? __fget_files+0x286/0x470 [ 371.393013][T13135] ? __fget_light+0xea/0x270 [ 371.397591][T13135] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 371.403824][T13135] __sys_sendmsg+0xe5/0x1b0 [ 371.408324][T13135] ? __sys_sendmsg_sock+0x30/0x30 [ 371.413341][T13135] ? syscall_enter_from_user_mode+0x21/0x70 [ 371.419311][T13135] ? trace_hardirqs_on+0x5b/0x1c0 [ 371.424330][T13135] do_syscall_64+0x35/0xb0 [ 371.428744][T13135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 371.434633][T13135] RIP: 0033:0x7f18552890e9 [ 371.439038][T13135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 371.458667][T13135] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 371.467069][T13135] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 371.475028][T13135] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 371.482990][T13135] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 371.490956][T13135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.498915][T13135] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 371.506881][T13135] [ 371.512655][T13124] isofs_fill_super: get root inode failed [ 371.588224][T12857] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 372.108644][T12857] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 372.117738][T12857] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 372.125946][T12857] usb 1-1: Product: syz [ 372.130169][T12857] usb 1-1: Manufacturer: syz [ 372.134883][T12857] usb 1-1: SerialNumber: syz [ 372.179264][T12857] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 372.748188][T12857] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 372.968166][ C0] usb 1-1: ath: unknown panic pattern! [ 373.151180][ T32] usb 1-1: USB disconnect, device number 17 14:39:10 executing program 0: r0 = syz_mount_image$efs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000280)=[{&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f0000000080)="a0a1fef1901965bda1395bff275c023718a999beb20ad1b52a8304a1b154d19307d6ae1462bbaa554805d79e9b7cddf1fcc147147d99f63523db6ead2d6dcdea0721fa6ad7a7dfebdbe6827c92ad", 0x4e, 0x2}, {&(0x7f0000000100)="6433ed8471167c0f201f1dbdb6e567c26727165f3df2afa87afb7df44ddd766025c649db001e0e6e04cdc45b5c198db3fbabab9cc534315a95eb252eb2bc734bcfe9862deb7c17e7a1ab7f1ab0d85dfd51c480079c6c61dac9806214644c052939a21bad0215846cfce297114646cf96b4a55bc6696cb3249aa6be4489b0a4ce84f1c9e4191e5eac4f104a02d2560fca", 0x90, 0x2}, {&(0x7f00000001c0)="919f7842373d2456710bc2ce0e45143b15577375e6adbdeac4fd8c5943a0d2a45ec941ae717e6c2490419818f0bcd578077dd48653d11ce25ce64a74ce0881e3a0c8ad596125d4d938032d24fb8b3875d8b6efeb24c07949e98de7ca8b006ee5bd0819b913e533eef61ba09b63d7b31b1a9a9bbca3f1237dd896e39b46324d7defbe74b3563d904ec1570a44b2a1c891c59b46", 0x93}], 0x2, &(0x7f0000000300)={[{'#'}], [{@dont_measure}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) fsync(r0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_mount_image$ocfs2(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x2, 0x2, &(0x7f00000004c0)=[{&(0x7f00000003c0)="028116a8aabba0b38f38d60ff9009d03", 0x10, 0x5}, {&(0x7f0000000400)="c5a6242e141c6ada4694d75b6e8b31bd921708faa1dc25982bd17e1221a36c7c88810ae355bedb521bd476ae899c75cbdc04dbe3191398fd19c97e744ff0e39734fa89155a24cc86198dc0d3b487114eaaa76f22ea1e813b859ba9bc625a9ba8f366e818783531519070381ba3765eb8927ba93ee9edccbbefa10c41844254a181fc7be172e6d66756a30d9559", 0x8d, 0x10001}], 0x1000000, &(0x7f0000000500)={[{'{'}, {'#'}, {}, {'func'}, {}, {'[-'}, {'CREDS_CHECK'}, {'#'}], [{@appraise}]}) 14:39:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(0xffffffffffffffff, 0x5437, 0x1) 14:39:10 executing program 2: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000340)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}], 0x0, &(0x7f0000000a80)=ANY=[]) 14:39:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 8) 14:39:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) [ 373.667223][T13150] FAULT_INJECTION: forcing a failure. [ 373.667223][T13150] name failslab, interval 1, probability 0, space 0, times 0 [ 373.673239][T13148] loop4: detected capacity change from 0 to 224 [ 373.681704][T13150] CPU: 1 PID: 13150 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 373.695063][T13150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.705218][T13150] Call Trace: [ 373.708505][T13150] [ 373.711436][T13150] dump_stack_lvl+0xcd/0x134 [ 373.716033][T13150] should_fail.cold+0x5/0xa [ 373.720541][T13150] ? kvmalloc_node+0x3e/0x190 [ 373.725258][T13150] should_failslab+0x5/0x10 [ 373.729753][T13150] __kmalloc_node+0x75/0x390 [ 373.734345][T13150] kvmalloc_node+0x3e/0x190 [ 373.738838][T13150] bitmap_port_create+0x31e/0x790 [ 373.743860][T13150] ? bitmap_port_kadt+0x4f0/0x4f0 [ 373.748878][T13150] ip_set_create+0x77e/0x1590 [ 373.753549][T13150] ? ip_set_sockfn_get+0xe60/0xe60 [ 373.758657][T13150] ? __nla_parse+0x3d/0x50 [ 373.763066][T13150] nfnetlink_rcv_msg+0xbc9/0x13f0 [ 373.768082][T13150] ? nfnetlink_net_init+0x380/0x380 [ 373.773274][T13150] ? lock_downgrade+0x6e0/0x6e0 [ 373.778115][T13150] ? nlmon_xmit+0xa4/0xe0 [ 373.782439][T13150] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 373.788672][T13150] ? dev_hard_start_xmit+0x382/0x920 [ 373.793946][T13150] ? __local_bh_enable_ip+0xa0/0x120 [ 373.799216][T13150] ? trace_hardirqs_on+0x5b/0x1c0 [ 373.804227][T13150] ? __dev_queue_xmit+0x1953/0x3920 [ 373.809412][T13150] ? __local_bh_enable_ip+0xa0/0x120 [ 373.814687][T13150] ? __dev_queue_xmit+0xa9b/0x3920 [ 373.819792][T13150] ? kasan_save_stack+0x1e/0x40 [ 373.824631][T13150] ? __kasan_slab_alloc+0x90/0xc0 [ 373.829646][T13150] ? kmem_cache_alloc_node+0x255/0x3f0 [ 373.835093][T13150] ? __alloc_skb+0x215/0x340 [ 373.839677][T13150] netlink_rcv_skb+0x153/0x420 [ 373.844436][T13150] ? nfnetlink_net_init+0x380/0x380 [ 373.849621][T13150] ? netlink_ack+0xa80/0xa80 [ 373.854209][T13150] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 373.860438][T13150] ? ns_capable+0xd9/0x100 [ 373.864850][T13150] nfnetlink_rcv+0x1ac/0x420 [ 373.869427][T13150] ? nfnetlink_rcv_batch+0x2600/0x2600 [ 373.874876][T13150] ? netlink_deliver_tap+0x1b1/0xc40 [ 373.880154][T13150] netlink_unicast+0x543/0x7f0 [ 373.884913][T13150] ? netlink_attachskb+0x880/0x880 [ 373.890012][T13150] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 373.896242][T13150] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 373.902474][T13150] ? __phys_addr_symbol+0x2c/0x70 [ 373.907501][T13150] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 373.913237][T13150] ? __check_object_size+0x16c/0x4f0 [ 373.918810][T13150] netlink_sendmsg+0x904/0xe00 [ 373.923572][T13150] ? netlink_unicast+0x7f0/0x7f0 [ 373.928500][T13150] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 373.934817][T13150] ? netlink_unicast+0x7f0/0x7f0 [ 373.939749][T13150] sock_sendmsg+0xcf/0x120 [ 373.944167][T13150] ____sys_sendmsg+0x6e2/0x800 [ 373.948921][T13150] ? kernel_sendmsg+0x50/0x50 [ 373.953589][T13150] ? do_recvmmsg+0x6d0/0x6d0 [ 373.958167][T13150] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 373.964398][T13150] ? _parse_integer+0x30/0x30 [ 373.969073][T13150] ? rcu_read_lock_sched_held+0xd/0x70 [ 373.974528][T13150] ? lock_release+0x522/0x720 [ 373.979199][T13150] ? __might_fault+0xd1/0x170 [ 373.983873][T13150] ___sys_sendmsg+0xf3/0x170 [ 373.988452][T13150] ? sendmsg_copy_msghdr+0x160/0x160 [ 373.993813][T13150] ? lock_release+0x522/0x720 [ 373.998482][T13150] ? lock_downgrade+0x6e0/0x6e0 [ 374.003323][T13150] ? rcu_read_lock_sched_held+0xd/0x70 [ 374.008856][T13150] ? lock_release+0x522/0x720 [ 374.013522][T13150] ? get_pid_task+0xe8/0x210 [ 374.018097][T13150] ? ksys_write+0x20c/0x250 [ 374.022588][T13150] ? __fget_files+0x286/0x470 [ 374.027256][T13150] ? __fget_light+0xea/0x270 [ 374.031836][T13150] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 374.038070][T13150] __sys_sendmsg+0xe5/0x1b0 [ 374.042561][T13150] ? __sys_sendmsg_sock+0x30/0x30 [ 374.047580][T13150] ? syscall_enter_from_user_mode+0x21/0x70 [ 374.053462][T13150] ? trace_hardirqs_on+0x5b/0x1c0 [ 374.058477][T13150] do_syscall_64+0x35/0xb0 [ 374.062887][T13150] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 374.068772][T13150] RIP: 0033:0x7f18552890e9 [ 374.073180][T13150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 374.092780][T13150] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 374.101188][T13150] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 374.109144][T13150] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 14:39:10 executing program 2: syz_emit_ethernet(0xa0, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) 14:39:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000ff0000000000040000ec00"}) r1 = syz_open_pts(r0, 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0xfff, 0x0, 0x0, 0x0, "f7337d965c21b8d516041092c4f74d143604d7"}) write(r1, &(0x7f0000000000)='\x00', 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 14:39:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCFLSH(r0, 0x5437, 0x0) 14:39:11 executing program 2: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 374.117097][T13150] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 374.125056][T13150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.133020][T13150] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 374.141077][T13150] [ 374.146711][T12857] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive 14:39:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}]}]}, 0x5c}}, 0x0) (fail_nth: 9) [ 374.188790][T12857] ath9k_htc: Failed to initialize the device [ 374.200717][T13148] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 374.206470][T13164] FAULT_INJECTION: forcing a failure. [ 374.206470][T13164] name failslab, interval 1, probability 0, space 0, times 0 [ 374.207029][ T32] usb 1-1: ath9k_htc: USB layer deinitialized [ 374.220606][T13164] CPU: 0 PID: 13164 Comm: syz-executor.1 Not tainted 5.18.0-rc7-syzkaller #0 [ 374.234857][T13164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.244909][T13164] Call Trace: [ 374.248179][T13164] [ 374.251096][T13164] dump_stack_lvl+0xcd/0x134 [ 374.255945][T13164] should_fail.cold+0x5/0xa [ 374.260446][T13164] should_failslab+0x5/0x10 [ 374.264946][T13164] __kmalloc+0x7e/0x350 [ 374.269093][T13164] ? bitmap_port_create+0x3c8/0x790 [ 374.274287][T13164] bitmap_port_create+0x3c8/0x790 [ 374.279311][T13164] ? bitmap_port_kadt+0x4f0/0x4f0 [ 374.284330][T13164] ip_set_create+0x77e/0x1590 [ 374.288998][T13164] ? ip_set_sockfn_get+0xe60/0xe60 [ 374.294102][T13164] ? __nla_parse+0x3d/0x50 [ 374.298508][T13164] nfnetlink_rcv_msg+0xbc9/0x13f0 [ 374.303758][T13164] ? nfnetlink_net_init+0x380/0x380 [ 374.308956][T13164] ? lock_downgrade+0x6e0/0x6e0 [ 374.313800][T13164] ? nlmon_xmit+0xa4/0xe0 [ 374.318117][T13164] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 374.324354][T13164] ? dev_hard_start_xmit+0x382/0x920 [ 374.329642][T13164] ? __local_bh_enable_ip+0xa0/0x120 [ 374.334916][T13164] ? trace_hardirqs_on+0x5b/0x1c0 [ 374.339929][T13164] ? __dev_queue_xmit+0x1953/0x3920 [ 374.345118][T13164] ? __local_bh_enable_ip+0xa0/0x120 [ 374.350400][T13164] ? __dev_queue_xmit+0xa9b/0x3920 [ 374.355504][T13164] ? kasan_save_stack+0x1e/0x40 [ 374.360344][T13164] ? __kasan_slab_alloc+0x90/0xc0 [ 374.365354][T13164] ? kmem_cache_alloc_node+0x255/0x3f0 [ 374.370801][T13164] ? __alloc_skb+0x215/0x340 [ 374.375385][T13164] netlink_rcv_skb+0x153/0x420 [ 374.380141][T13164] ? nfnetlink_net_init+0x380/0x380 [ 374.385329][T13164] ? netlink_ack+0xa80/0xa80 [ 374.389911][T13164] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 374.396143][T13164] ? ns_capable+0xd9/0x100 [ 374.400554][T13164] nfnetlink_rcv+0x1ac/0x420 [ 374.405138][T13164] ? nfnetlink_rcv_batch+0x2600/0x2600 [ 374.410584][T13164] ? netlink_deliver_tap+0x1b1/0xc40 [ 374.415868][T13164] netlink_unicast+0x543/0x7f0 [ 374.420630][T13164] ? netlink_attachskb+0x880/0x880 [ 374.425828][T13164] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 374.432062][T13164] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 374.438292][T13164] ? __phys_addr_symbol+0x2c/0x70 [ 374.443319][T13164] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 374.449036][T13164] ? __check_object_size+0x16c/0x4f0 [ 374.454318][T13164] netlink_sendmsg+0x904/0xe00 [ 374.459075][T13164] ? netlink_unicast+0x7f0/0x7f0 [ 374.464007][T13164] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 374.470239][T13164] ? netlink_unicast+0x7f0/0x7f0 [ 374.475167][T13164] sock_sendmsg+0xcf/0x120 [ 374.479573][T13164] ____sys_sendmsg+0x6e2/0x800 [ 374.484355][T13164] ? kernel_sendmsg+0x50/0x50 [ 374.489018][T13164] ? do_recvmmsg+0x6d0/0x6d0 [ 374.493592][T13164] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 374.499819][T13164] ? _parse_integer+0x30/0x30 [ 374.504491][T13164] ? rcu_read_lock_sched_held+0xd/0x70 [ 374.509939][T13164] ? lock_release+0x522/0x720 [ 374.514606][T13164] ? __might_fault+0xd1/0x170 [ 374.519276][T13164] ___sys_sendmsg+0xf3/0x170 [ 374.523865][T13164] ? sendmsg_copy_msghdr+0x160/0x160 [ 374.529136][T13164] ? lock_release+0x522/0x720 [ 374.533804][T13164] ? lock_downgrade+0x6e0/0x6e0 [ 374.538644][T13164] ? rcu_read_lock_sched_held+0xd/0x70 [ 374.544091][T13164] ? lock_release+0x522/0x720 [ 374.548757][T13164] ? get_pid_task+0xe8/0x210 [ 374.553331][T13164] ? ksys_write+0x20c/0x250 [ 374.557820][T13164] ? __fget_files+0x286/0x470 [ 374.562492][T13164] ? __fget_light+0xea/0x270 [ 374.567077][T13164] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 374.573309][T13164] __sys_sendmsg+0xe5/0x1b0 [ 374.577806][T13164] ? __sys_sendmsg_sock+0x30/0x30 [ 374.582821][T13164] ? syscall_enter_from_user_mode+0x21/0x70 [ 374.588713][T13164] ? trace_hardirqs_on+0x5b/0x1c0 [ 374.593729][T13164] do_syscall_64+0x35/0xb0 [ 374.598137][T13164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 374.604019][T13164] RIP: 0033:0x7f18552890e9 [ 374.608419][T13164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 374.628191][T13164] RSP: 002b:00007f1856455168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:39:11 executing program 2: syz_emit_ethernet(0xa3, &(0x7f0000000300)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x6d, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b259491c71a82423730000d2439adc07df0a69748e254c1e4a8a07000000c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x1, "0000f0000000000000"}, {0x0, 0x1, "5df90bddeea8"}]}}}}}}, 0x0) [ 374.636595][T13164] RAX: ffffffffffffffda RBX: 00007f185539bf60 RCX: 00007f18552890e9 [ 374.644552][T13164] RDX: 0000000000000000 RSI: 0000000020001240 RDI: 0000000000000003 [ 374.652511][T13164] RBP: 00007f18564551d0 R08: 0000000000000000 R09: 0000000000000000 [ 374.660474][T13164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.668432][T13164] R13: 00007ffea89ac4ef R14: 00007f1856455300 R15: 0000000000022000 [ 374.676394][T13164] [ 374.704103][T13148] isofs_fill_super: get root inode failed [ 375.048172][ T32] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 375.598281][ T32] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 375.607473][ T32] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 375.615744][ T32] usb 1-1: Product: syz [ 375.620115][ T32] usb 1-1: Manufacturer: syz [ 375.625132][ T32] usb 1-1: SerialNumber: syz [ 375.668799][ T32] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested