[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.372526] audit: type=1800 audit(1545699338.617:25): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.407568] audit: type=1800 audit(1545699338.617:26): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.450612] audit: type=1800 audit(1545699338.627:27): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. 2018/12/25 00:55:49 fuzzer started 2018/12/25 00:55:51 dialing manager at 10.128.0.26:44709 2018/12/25 00:55:51 syscalls: 1 2018/12/25 00:55:51 code coverage: enabled 2018/12/25 00:55:51 comparison tracing: enabled 2018/12/25 00:55:51 setuid sandbox: enabled 2018/12/25 00:55:51 namespace sandbox: enabled 2018/12/25 00:55:51 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/25 00:55:51 fault injection: enabled 2018/12/25 00:55:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/25 00:55:51 net packet injection: enabled 2018/12/25 00:55:51 net device setup: enabled 00:59:00 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) sendto$x25(r0, &(0x7f0000000040)="e5df1ee62e7bcfa827ac098e2566baafba76d0efb064c9759cd5c086a8f0e1389ec3738f4ff11611bcc537df19bb50616fd7b39c692263fa087aa0c039c48a2f57bc47925309c7130c72a0a9cef0721c163a5f14cf31a9bf963ca591e9895f76538c67ae903928e1e51ea1d70b29faa4600b1656bb0b21b503c955ed814e9b3eb01323ce3fb406fc7bf5b3c3c2562e8e1aaae681d67930b0032e4b926ed3b43705d2e3c7c635e1ffdc01cb0aa79d8aa4944791f6", 0xb4, 0x4000000, &(0x7f0000000100)={0x9, @remote={[], 0x0}}, 0x12) r1 = accept4(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', r2}) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) fcntl$setown(r0, 0x8, r4) recvfrom$unix(r1, &(0x7f0000000280)=""/135, 0x87, 0x40012021, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000440)={r5, &(0x7f0000000380)=""/141}) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0xf, 0x8001, 0xffffffff, 0x7, 0x1, 0xffffffffffffffff, 0x2}, 0x2c) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000004c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, r3}, 0xc) prctl$PR_MCE_KILL_GET(0x22) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000500)) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000580)=0x4f) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000005c0)) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000600)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, r6, 0x111, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xba}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) rt_sigaction(0x4, &(0x7f00000008c0)={&(0x7f0000000840)="8128258cffff660f381c39c4c2459ca87ae2bbf5400f1b5e2641d8eec4e17a7f7e4df26dc4c21d0cf126f0468045aa008fa838a6df0a", {0x81}, 0x4, &(0x7f0000000880)="c4c1a15fd0c4c3790457e1013eaac4c3497daf170b92a400c4e2e5995712c482b59efd3e420f189109088041c4e1e1d916c4a1f813770f2ef042806004c7"}, &(0x7f00000009c0)={&(0x7f0000000900)="f30f1a9a3f8bc98ff246ab660f6e280f6712002500100000c462690c1c62f36465640f902bc4a199fe5509660fc2fd0826f047f715c3015099", {}, 0x0, &(0x7f0000000940)="0f5f1bc4a1c85479c6c482359c7c8f0cc4e20d366de4c402e1ba766ec46361448e296e4b4a056426f346f76a000fef9df5587a98f2440f38f1907b080000c443f9637faef1"}, 0x8, &(0x7f0000000a00)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a40)={0x0, 0x0, 0xa, [0x3, 0x3, 0x200, 0x1000, 0x0, 0x9, 0x4, 0x100000000, 0x0, 0x8001]}, &(0x7f0000000a80)=0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000ac0)={r7, 0xff00000000000000}, &(0x7f0000000b00)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000b40)={r7, 0x401, 0x7}, &(0x7f0000000b80)=0x8) write$P9_RLERROR(r0, &(0x7f0000000bc0)={0x1c, 0x7, 0x2, {0x13, '\'posix_acl_access:@'}}, 0x1c) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000c00)) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000c40)={0x6, 0x4, 0xda7c}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000d00)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000e00)=0xe8) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000f00)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001040)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001140)=0xe8) r12 = geteuid() fstat(r1, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000012c0)={0x0, 0x0, 0x0}, &(0x7f0000001300)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='system.posix_acl_default\x00', &(0x7f0000001340)={{}, {0x1, 0x2}, [{0x2, 0x2, r8}, {0x2, 0x1, r9}, {0x2, 0x7, r10}, {0x2, 0x3, r11}, {0x2, 0x4, r12}, {0x2, 0x4, r13}], {0x4, 0x1}, [{0x8, 0x2, r14}, {0x8, 0x2, r15}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x1) 00:59:01 executing program 1: io_setup(0x0, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_getevents(r0, 0x8001, 0x9, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)={r1, r2+30000000}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000240)) getitimer(0x3, &(0x7f00000002c0)) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000300)={0x0, 0x7c2, 0x3, [0xbef, 0x3, 0x8]}, &(0x7f0000000340)=0xe) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r5, 0x8}, &(0x7f00000003c0)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000400)) r6 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet_dccp_int(r3, 0x21, 0x10, &(0x7f0000000480), &(0x7f00000004c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000580)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in6={0xa, 0x4e24, 0x80, @empty, 0x200}}}, 0x90) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000640)={0x3, [0xde, 0x6, 0x9]}, &(0x7f0000000680)=0xa) ioctl$VIDIOC_G_INPUT(r4, 0x80045626, &(0x7f00000006c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000700)={0x2, [0x0, 0x0]}, &(0x7f0000000740)=0xc) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000780)={r3, 0x20, 0x41, "35d4402b30ba2c56c221f749deff3a3c3acab9aef071b3b093dae69f8696918a5406a8da5ef400adc3f4eee6f46687d0ca13860c276851439ee4e73d342951e257eefbe8ea2e1e41c77a02ead6046a3d3af8114b5f521d2222f396d02055be46e169c7b9c43707e3cc3618cde0d7a5682e03a4139dd21111620ff53707b8c2aa0d1360952089484a0ff5d802a3fcac70e884ffc393f214ed7d93e20769d7d0df69b528f94825136b83ec888c38f90c5834fd6756afadac7da62867f977f81cdc56769af14026bfb048bf571a8eeff079fa"}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000008c0)={&(0x7f0000000880)='./file0\x00', r3}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000900)={0x3c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x3, 'wrr\x00', 0x8, 0x10001, 0x5e}, 0x2c) pselect6(0x40, &(0x7f0000000940)={0x3, 0xd90, 0x9, 0x5, 0x7fffffff, 0x7, 0x0, 0x20000000000000}, &(0x7f0000000980)={0x7fff, 0x1, 0xfff, 0x7, 0x1, 0x3, 0xf355, 0x6}, &(0x7f00000009c0)={0x200, 0x10001, 0x8e, 0x100, 0x3f, 0xff, 0x7, 0x10000}, &(0x7f0000000a00)={0x77359400}, &(0x7f0000000a80)={&(0x7f0000000a40)={0x100000001}, 0x8}) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000ac0)) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b40)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000c00)={&(0x7f0000000b00), 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x30, r9, 0x0, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x2400c000}, 0x804) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000c40)={r8, @in6={{0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, [], 0x1d}, 0x2}}}, &(0x7f0000000d00)=0x84) openat$cuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/cuse\x00', 0x2, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000d80), &(0x7f0000000dc0)=0x10) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x8, 0x800, 0x0, 0x6, 0x1b, 0x1, "c796a315b0e06ca5bb06124cbf52a4593e86945a641f7bb571167a98cdffdcec1af497b8f65d462cd474cb7cf2cd11df6c6d4d88d514905f410ea0aa51bd838a", "7b62644b05f4164866599e105f69fafdbd696482c1b71881f0ae13593fd81056b8c0dc3efd871efb68a33bbee248b2a7702e7af05f8a70f060bf3b8663fdf6fa", "321248d49286c1061c80e69a4e4800b587a39457a09f87ab147b47dcc7a91c47", [0x8, 0x9]}) r10 = syz_genetlink_get_family_id$nbd(&(0x7f0000000f40)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000001040)={&(0x7f0000000f00), 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x44, r10, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syzkaller login: [ 241.000921] IPVS: ftp: loaded support on port[0] = 21 00:59:01 executing program 2: lsetxattr$security_capability(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x7, 0x3ff}, {0x6, 0xffffffff}]}, 0x14, 0x2) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x8) recvmmsg(r0, &(0x7f0000004e80)=[{{&(0x7f0000002b80)=@can={0x1d, 0x0}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002c00)=""/102, 0x66}, {&(0x7f0000002c80)=""/253, 0xfd}, {&(0x7f0000002d80)=""/173, 0xad}, {&(0x7f0000002e40)=""/194, 0xc2}, {&(0x7f0000002f40)=""/225, 0xe1}, {&(0x7f0000003040)=""/241, 0xf1}, {&(0x7f0000003140)=""/102, 0x66}], 0x7, &(0x7f0000003240)=""/22, 0x16}, 0x1}, {{&(0x7f0000003280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003300)=""/43, 0x2b}, {&(0x7f0000003340)=""/227, 0xe3}, {&(0x7f0000003440)=""/249, 0xf9}, {&(0x7f0000003540)=""/108, 0x6c}, {&(0x7f00000035c0)=""/102, 0x66}, {&(0x7f0000003640)=""/92, 0x5c}], 0x6, &(0x7f0000003740)=""/17, 0x11}, 0x1b9}, {{&(0x7f0000003780)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003800)=""/130, 0x82}], 0x1, &(0x7f0000003900)=""/60, 0x3c}, 0x7}, {{&(0x7f0000003940)=@l2, 0x80, &(0x7f0000003a80)=[{&(0x7f00000039c0)=""/187, 0xbb}], 0x1, &(0x7f0000003ac0)=""/177, 0xb1}, 0x101}, {{&(0x7f0000003b80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000004d40)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/47, 0x2f}, {&(0x7f0000004c40)=""/235, 0xeb}], 0x3, &(0x7f0000004d80)=""/229, 0xe5}, 0x3}], 0x5, 0x10001, &(0x7f0000004fc0)={0x77359400}) sendmsg$nl_route_sched(r0, &(0x7f0000005200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000051c0)={&(0x7f0000005000)=@newqdisc={0x184, 0x24, 0x511, 0x70bd2b, 0x25dfdbfd, {0x0, r1, {0x0, 0xf}, {0x0, 0xfff3}, {0x7, 0x3}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x68, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x9, 0x9, 0x3, 0xb, 0xa, 0x18, 0x1}}, @TCA_RED_PARMS={0x14, 0x1, {0x2, 0x8d9, 0x101, 0x6, 0x17, 0x100000001, 0x3}}, @TCA_RED_PARMS={0x14, 0x1, {0x7, 0x9, 0x39d, 0x11, 0x3, 0x7}}, @TCA_RED_PARMS={0x14, 0x1, {0xa6, 0x1438ee9c, 0x5, 0x5, 0x3, 0xfffffffffffffffb, 0x5}}, @TCA_RED_PARMS={0x14, 0x1, {0x7, 0x5, 0x9, 0x7, 0x4, 0xa}}]}}, @TCA_STAB={0x80, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0xff, 0x3, 0x8, 0x6, 0x2, 0x1000, 0x8, 0x5}}, @TCA_STAB_DATA={0xc, 0x2, [0x3f, 0x3f, 0x5]}, @TCA_STAB_DATA={0x10, 0x2, [0x9, 0xcea6, 0x1, 0x4, 0xf36f, 0x101]}, @TCA_STAB_DATA={0x10, 0x2, [0x6, 0x80000001, 0x9, 0x1, 0x200]}, @TCA_STAB_BASE={0x1c, 0x1, {0x100000000, 0x0, 0x3, 0x4, 0x2, 0x80000000, 0xff, 0x6}}, @TCA_STAB_DATA={0x18, 0x2, [0x5, 0x1ff, 0x2, 0x3, 0x8, 0x20000000000000, 0x7, 0xc2, 0x10000, 0x6]}]}, @TCA_RATE={0x8, 0x5, {0x1, 0x1f}}, @TCA_RATE={0x8, 0x5, {0x1ff, 0x8000}}, @TCA_RATE={0x8, 0x5, {0xb4, 0x9}}, @qdisc_kind_options=@q_netem={{0xc, 0x1, 'netem\x00'}, {0x34, 0x2, {{0xfffffffffffffffe, 0x3, 0x0, 0x8000, 0x8000, 0x20}, [@TCA_NETEM_DELAY_DIST={0x18, 0x2, "850bda14928cd1dcf64592f4e028f0afb0"}]}}}, @TCA_RATE={0x8, 0x5, {0x1, 0xffc0000000000}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}, @TCA_RATE={0x8, 0x5, {0x20, 0x4}}]}, 0x184}, 0x1, 0x0, 0x0, 0x840}, 0x40000) sync_file_range(r0, 0x0, 0x5e9, 0x7) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000052c0)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000053c0)=0xe8) r6 = geteuid() getresuid(&(0x7f0000005400)=0x0, &(0x7f0000005440), &(0x7f0000005480)) lsetxattr$system_posix_acl(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)='system.posix_acl_access\x00', &(0x7f00000054c0)={{}, {0x1, 0x4}, [{0x2, 0x1, r5}, {0x2, 0x3, r6}, {0x2, 0x1, r7}], {}, [], {}, {0x20, 0x1}}, 0x3c, 0x2) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000005500)={r0, 0xffffffffffff7fff, 0x7, r0}) prctl$PR_GET_SECUREBITS(0x1b) sendmsg$nl_route_sched(r0, &(0x7f0000005640)={&(0x7f0000005540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000005600)={&(0x7f0000005580)=@deltfilter={0x78, 0x2d, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, r4, {0x13, 0x7}, {0xfff2, 0xffff}, {0xfff3, 0xf}}, [@TCA_RATE={0x8, 0x5, {0x7, 0x6}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0xfff1}}]}}, @TCA_RATE={0x8, 0x5, {0xfe, 0x6}}, @filter_kind_options=@f_fw={{0x8, 0x1, 'fw\x00'}, {0x1c, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0xfff7}}, @TCA_FW_MASK={0x8, 0x5, 0x9}, @TCA_FW_CLASSID={0x8, 0x1, {0x2, 0xf}}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x24000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000005680)=[@in6={0xa, 0x4e23, 0x9, @ipv4={[], [], @local}, 0x10001}, @in6={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffff8}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xe}, 0x7f}], 0x64) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000005700), &(0x7f0000005740)=0x4) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000057c0)={0x4, 0xf, 0x4, 0x0, {0x0, 0x2710}, {0x3, 0xf, 0x4, 0xffffffffffffff49, 0x4, 0xfff, "3b1ad696"}, 0x2, 0x6, @planes=&(0x7f0000005780)={0x100, 0x6, @fd=0xffffffffffffff9c, 0x1d32b103}, 0x4}) r8 = inotify_add_watch(r0, &(0x7f0000005840)='./file0\x00', 0x10) inotify_rm_watch(r0, r8) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000005880)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000058c0)={0x0, @in6={{0xa, 0x4e20, 0x100000001, @remote, 0x7e2}}, 0x8, 0x101, 0x6, 0x7, 0x80}, &(0x7f0000005980)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000059c0)={r10, 0x80}, &(0x7f0000005a00)=0x8) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000005a40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x2, @default, @bpq0='bpq0\x00', 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}) sendmsg$nl_route_sched(r2, &(0x7f0000005b80)={&(0x7f0000005ac0), 0xc, &(0x7f0000005b40)={&(0x7f0000005b00)=@gettclass={0x24, 0x2a, 0x2, 0x70bd28, 0x25dfdbff, {0x0, r4, {0x0, 0xffff}, {0x5, 0xf}, {0xffff, 0xffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000005bc0)={'nat\x00', 0x7c, "ffc7608eef56bf22c87f4ce230be1ed4fbf464f87558b186a2915c0af05e8a2a1aaf5fce84a7393f01b71f027fa0c3d62eb766baeb518115e9d77083f1547bc7cc2342af852872c84c110ae95aa071ba093f9d45be6c2712baba925cd22f6a469e5d62e40e3fc1e1d203473b81d6627354867793c49bef79d1edd2b6"}, &(0x7f0000005c80)=0xa0) ioctl$RTC_AIE_ON(r9, 0x7001) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000005cc0)={0x3, 0x80000000, 0x2}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005d00)) setsockopt$inet_sctp_SCTP_CONTEXT(r9, 0x84, 0x11, &(0x7f0000005d40)={r11, 0x20}, 0x8) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005d80)=0x0) syz_open_procfs(r12, &(0x7f0000005dc0)='projid_map\x00') [ 241.385135] IPVS: ftp: loaded support on port[0] = 21 00:59:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000100)={0x3, 0xcfb4635}) sendfile(r0, r1, &(0x7f0000000140), 0x8) readahead(r0, 0x81, 0x9fa9) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000180)=0xfffffffffffffff7) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x7fff, 0x1, 0x1}) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x1ba680000, 0x4000) write$evdev(r2, &(0x7f0000000240)=[{{0x0, 0x7530}, 0x17, 0xcca}], 0x18) readahead(r1, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x7d, 0x202, 0x0, 0xe1, 0x7}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x4e20, @empty}}, 0x10001, 0xffffffffffffb2e0}, 0x90) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x8, 0x8100) exit_group(0x1) fchdir(r1) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002780)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000002880)=0xe8) accept(r0, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002940)=0x80) getpeername$packet(r0, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002b00)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002ec0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002f00)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000003000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000030c0)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000031c0)=0xe8) accept4(r0, &(0x7f0000003200)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003280)=0x80, 0x80000) recvmmsg(r0, &(0x7f0000009fc0)=[{{&(0x7f00000047c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000004f00)=[{&(0x7f0000004840)=""/152, 0x98}, {&(0x7f0000004900)=""/77, 0x4d}, {&(0x7f0000004980)=""/87, 0x57}, {&(0x7f0000004a00)=""/58, 0x3a}, {&(0x7f0000004a40)=""/199, 0xc7}, {&(0x7f0000004b40)}, {&(0x7f0000004b80)=""/236, 0xec}, {&(0x7f0000004c80)=""/226, 0xe2}, {&(0x7f0000004d80)=""/172, 0xac}, {&(0x7f0000004e40)=""/158, 0x9e}], 0xa, &(0x7f0000004fc0)=""/117, 0x75}, 0x6}, {{&(0x7f0000005040)=@nl=@unspec, 0x80, &(0x7f0000005140)=[{&(0x7f00000050c0)=""/125, 0x7d}], 0x1, &(0x7f0000005180)=""/81, 0x51}, 0x2}, {{&(0x7f0000005200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000005600)=[{&(0x7f0000005280)=""/52, 0x34}, {&(0x7f00000052c0)=""/69, 0x45}, {&(0x7f0000005340)=""/146, 0x92}, {&(0x7f0000005400)=""/166, 0xa6}, {&(0x7f00000054c0)=""/197, 0xc5}, {&(0x7f00000055c0)=""/9, 0x9}], 0x6, &(0x7f0000005680)=""/44, 0x2c}, 0x2}, {{&(0x7f00000056c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000005840)=[{&(0x7f0000005740)=""/171, 0xab}, {&(0x7f0000005800)=""/55, 0x37}], 0x2, &(0x7f0000005880)=""/56, 0x38}, 0x4}, {{0x0, 0x0, &(0x7f0000005b40)=[{&(0x7f00000058c0)=""/240, 0xf0}, {&(0x7f00000059c0)=""/109, 0x6d}, {&(0x7f0000005a40)=""/213, 0xd5}], 0x3, &(0x7f0000005b80)=""/4096, 0x1000}, 0xffff}, {{&(0x7f0000006b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007140)=[{&(0x7f0000006c00)=""/196, 0xc4}, {&(0x7f0000006d00)=""/20, 0x14}, {&(0x7f0000006d40)=""/216, 0xd8}, {&(0x7f0000006e40)=""/236, 0xec}, {&(0x7f0000006f40)=""/130, 0x82}, {&(0x7f0000007000)=""/219, 0xdb}, {&(0x7f0000007100)=""/49, 0x31}], 0x7, &(0x7f00000071c0)=""/4096, 0x1000}, 0x10001}, {{&(0x7f00000081c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000008740)=[{&(0x7f0000008240)=""/134, 0x86}, {&(0x7f0000008300)=""/16, 0x10}, {&(0x7f0000008340)=""/206, 0xce}, {&(0x7f0000008440)=""/63, 0x3f}, {&(0x7f0000008480)=""/175, 0xaf}, {&(0x7f0000008540)=""/122, 0x7a}, {&(0x7f00000085c0)=""/126, 0x7e}, {&(0x7f0000008640)=""/95, 0x5f}, {&(0x7f00000086c0)=""/107, 0x6b}], 0x9, &(0x7f0000008800)=""/20, 0x14}, 0x2de}, {{&(0x7f0000008840)=@nfc, 0x80, &(0x7f0000009e00)=[{&(0x7f00000088c0)=""/78, 0x4e}, {&(0x7f0000008940)=""/155, 0x9b}, {&(0x7f0000008a00)=""/95, 0x5f}, {&(0x7f0000008a80)=""/101, 0x65}, {&(0x7f0000008b00)=""/149, 0x95}, {&(0x7f0000008bc0)=""/101, 0x65}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/103, 0x67}, {&(0x7f0000009cc0)=""/226, 0xe2}, {&(0x7f0000009dc0)=""/13, 0xd}], 0xa, &(0x7f0000009ec0)=""/216, 0xd8}, 0xde3}], 0x8, 0x0, &(0x7f000000a1c0)={0x77359400}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f000000a200)={@remote, @remote, 0x0}, &(0x7f000000a240)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f000000a340)={@local, 0x0}, &(0x7f000000a380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a3c0)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f000000a400)={@remote, 0x0}, &(0x7f000000a440)=0x14) getsockname(r0, &(0x7f000000a480)=@xdp={0x2c, 0x0, 0x0}, &(0x7f000000a500)=0x80) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f000000a540)={0x0, @initdev, @initdev}, &(0x7f000000a580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a5c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f000000a6c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f000000a800)={0x0, @dev}, &(0x7f000000a840)=0xc) getpeername$packet(r0, &(0x7f000000a880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a8c0)=0x14) accept4$packet(r1, &(0x7f000000a9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000aa00)=0x14, 0x800) getpeername$packet(r1, &(0x7f000000aa40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000aa80)=0x14) accept4$packet(r1, &(0x7f000000ad40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad80)=0x14, 0x80000) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000b880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f000000b840)={&(0x7f000000adc0)={0xa6c, r4, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1d0, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x16c, 0x81, 0x9, 0x136}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff17}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8001, 0x7, 0x4, 0x9}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x100000001, 0x1, 0x1, 0x8}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r13}, {0x4}}, {{0x8, 0x1, r14}, {0x128, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x98, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x6, 0x4, 0x81, 0xd12}, {0xcfc7, 0x100000001, 0x7, 0x3}, {0x20, 0x1, 0x9, 0x7ff}, {0xfe26, 0xc4a, 0x6}, {0x3, 0x88, 0x81, 0x4ebe}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}]}}, {{0x8, 0x1, r19}, {0x80, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r21}, {0x168, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x69}}, {0x8, 0x7, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r25}, {0x104, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x10001, 0x6, 0x1, 0xea5}, {0x100000001, 0x8, 0x10000, 0xfffffffffffffeff}, {0x7, 0xfffc000000000000, 0x8000, 0x8b0}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x25}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}]}}, {{0x8, 0x1, r27}, {0x84, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r28}}}]}}]}, 0xa6c}, 0x1, 0x0, 0x0, 0x4}, 0x20004040) [ 241.857103] IPVS: ftp: loaded support on port[0] = 21 00:59:02 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x24000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x3, {0xa00, 0x40, "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", 0x14, 0x3, 0x0, 0x1000, 0xffff, 0x7fff, 0x2}, r1}}, 0x128) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000200)={0x3, 0x302b96f5}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @multicast1}}, [0x32bf, 0x20, 0x6, 0x4, 0x9, 0x80000001, 0xe0a, 0x0, 0xfffffffffffffe00, 0x1, 0x2, 0x3, 0x1000, 0x0, 0xe85]}, &(0x7f00000003c0)=0x100) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000400)={r3, 0xb7, "39ad9daad43ea4ff9e470b1a3a8f4d78be8f61c1d2bb20575c7771ffe7046d54237527a4eaaec81adef7faeaa64db068227df5757ad3d21e16516e450bb1f861f0cb7580352d02df0ed14de62c29fb2fdf49df57c818898760734b3e6308a0953c0f1ea3e9120dc2b0ae66414893fd22887ce700bf673efe98224958f7f127cb05120da489f3f4cdacd3b95366a60ec6d700b9e9283056228d2ab8b8feb39b90ceea3e22a7dfa19287760494ccafa9bd8fabad8cf72384"}, &(0x7f00000004c0)=0xbf) r5 = semget$private(0x0, 0x2, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000600)=0xe8) getgroups(0x1, &(0x7f0000000640)=[0x0]) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000840)={{0xff, r7, r8, r9, r10, 0x4, 0x9}, 0xffff, 0xab66, 0x7fff}) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$sock_inet6_SIOCADDRT(r11, 0x890b, &(0x7f0000000900)={@dev={0xfe, 0x80, [], 0xd}, @loopback, @loopback, 0x2, 0x6, 0xa2, 0x500, 0x3, 0x104, r6}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r11, 0x6, 0x15, &(0x7f0000000980)=0x40, 0x4) r12 = syz_open_dev$rtc(&(0x7f00000009c0)='/dev/rtc#\x00', 0xef7, 0x800) sendto$inet(r12, &(0x7f0000000a00)="e9937331f18ffbbc051c4194999627219529b298a1113dd67d", 0x19, 0x8000, &(0x7f0000000a40)={0x2, 0x4e20, @local}, 0x10) flistxattr(r0, &(0x7f0000000a80)=""/199, 0xc7) sendto$netrom(r11, &(0x7f0000000b80)="0df222d9427a1f02971895a8cec51c481eeed269999ad082b35b5bc1c76c0b3da3481139b655b873f7610437fe354bd9c3b2bb2a50ed96b9c3abaea092c9280967d99ec06144b61d8a578b1571924075d5cb995cd32480ea1c54e09cf444b4116dad9c5350dfc9c0fc537cfbeffc9375016ca47a3a5808932d8c7a5768662996eb207f91321103979e0cb125dc1405f060f69f1b1afdd1ad648416583c71dcceec9b777e3ebb1c88ce14be45367c9e6aa5aac5d6af8b520d076c042c2ffc97", 0xbf, 0x1, &(0x7f0000000c40)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) getsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000cc0), &(0x7f0000000d00)=0x4) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) fsetxattr$security_evm(r11, &(0x7f0000000d40)='security.evm\x00', &(0x7f0000000d80)=@v1={0x2, "841b4acda18eb45331970eac0c0172d14290c2"}, 0x14, 0x2) lsetxattr$trusted_overlay_upper(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)='trusted.overlay.upper\x00', &(0x7f0000000e40)={0x0, 0xfb, 0x1d, 0x4, 0xbeb, "31d9dafef9934842b7da9f789d9f3569", "1bf8dddf3985724a"}, 0x1d, 0x1) getsockopt$bt_BT_SECURITY(r11, 0x112, 0x4, &(0x7f0000000e80), 0x2) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/video35\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000f00)={0x9, 0x108, 0xfa00, {r2, 0xc8, "55a04f", "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"}}, 0x110) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000001040)={0x1}, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001080)={0x7f, 0x202, 0x8ce, 0x1f, r4}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(r11, 0x40087705, &(0x7f00000010c0)={0x6, 0x9}) [ 242.588747] IPVS: ftp: loaded support on port[0] = 21 00:59:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/149, &(0x7f00000000c0)=0x95) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000140)=""/115) ioctl$KDSETLED(r1, 0x4b32, 0x2) ioctl$TIOCSBRK(r1, 0x5427) fcntl$getflags(r1, 0x3) name_to_handle_at(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x1c, 0x3, "d6b710500d79f11fffd383ddf402f04801e42b31"}, &(0x7f0000000240), 0x1000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e22, @rand_addr=0x10001}}) accept4$x25(r2, 0x0, &(0x7f0000000300), 0x80000) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000340)=0x9, 0x4) flistxattr(r1, &(0x7f0000000380)=""/175, 0xaf) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x101000, 0x0) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000480)={r2, 0x0, 0x1000001010000, 0xfffff000}) mq_timedreceive(r3, &(0x7f00000004c0)=""/128, 0x80, 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000540)={0x5, 0xa, 0x2, "6870cdaef5ec5392797ed6ae113c4625b501b2267e9bb1b8fef4cba4a3323482", 0x71436772}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000580)={0x0, 0x7f}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000600)=@assoc_value={r4, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000640)={r4, 0x4}, &(0x7f0000000680)=0x8) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000006c0)=""/83) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xfffffffffffffffb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x22000, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000780)={0x0, @reserved}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000840)={'filter\x00', 0x4}, 0x68) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) getsockname$unix(r1, &(0x7f00000008c0), &(0x7f0000000940)=0x6e) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000009c0)={0x7, &(0x7f0000000980)=[{0x1, 0xb6b, 0x2, 0x2}, {0xd7, 0x1, 0x2, 0x6}, {0x3, 0x101, 0x6, 0x1}, {0x2, 0x1f, 0x7fff, 0xff}, {0x1, 0x6, 0x5, 0x3}, {0x7ff, 0x100000000, 0x3, 0xffffffff}, {0x2, 0x800, 0x5cf, 0x100000001}]}, 0x10) [ 242.929087] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.937992] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.945549] device bridge_slave_0 entered promiscuous mode [ 243.063700] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.087627] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.094973] device bridge_slave_1 entered promiscuous mode [ 243.247054] IPVS: ftp: loaded support on port[0] = 21 [ 243.281096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.395513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.452360] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.477807] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.485123] device bridge_slave_0 entered promiscuous mode [ 243.601863] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.630191] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.638459] device bridge_slave_1 entered promiscuous mode [ 243.671446] IPVS: ftp: loaded support on port[0] = 21 [ 243.742066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.849668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.861406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.916444] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.960722] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.978269] device bridge_slave_0 entered promiscuous mode [ 244.023652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.098935] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.106515] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.118931] device bridge_slave_1 entered promiscuous mode [ 244.210942] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 244.331433] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.382915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 244.457568] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.562036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.628849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.684195] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.705282] team0: Port device team_slave_0 added [ 244.726856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.742358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.851761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.870261] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.883515] team0: Port device team_slave_1 added [ 245.026698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.061325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.123192] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.132169] team0: Port device team_slave_0 added [ 245.144776] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.153780] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.167814] device bridge_slave_0 entered promiscuous mode [ 245.190301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.240545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.259298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.267242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.326234] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.342096] team0: Port device team_slave_1 added [ 245.359747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 245.386304] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.397856] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.414272] device bridge_slave_1 entered promiscuous mode [ 245.421907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.435775] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.449224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.459567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.489395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.511165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.521831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.568749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.624313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.638133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.655630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.670583] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.676944] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.685435] device bridge_slave_0 entered promiscuous mode [ 245.716938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 245.769060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.776270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.798025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.860768] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.867260] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.874967] device bridge_slave_1 entered promiscuous mode [ 245.892519] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.901592] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.929012] device bridge_slave_0 entered promiscuous mode [ 245.939817] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.955914] team0: Port device team_slave_0 added [ 245.970085] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.001485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.023839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.033675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.060332] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.071949] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.095481] device bridge_slave_1 entered promiscuous mode [ 246.126584] ip (8327) used greatest stack depth: 15928 bytes left [ 246.134984] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.147090] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.157153] team0: Port device team_slave_1 added [ 246.169155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.200924] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.272882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.347822] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.378788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.385834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.398105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.415690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.457093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 246.477882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.520626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.539145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.556633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.596907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 246.608330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.632900] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.665136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.680529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.696304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.786091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.891796] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.925418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 246.958213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.975119] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.998365] team0: Port device team_slave_0 added [ 247.059557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.112624] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.119239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.126411] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.132900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.151611] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.175143] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.198299] team0: Port device team_slave_1 added [ 247.343073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.390766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.461186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 247.475848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.493161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.504025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.512160] team0: Port device team_slave_0 added [ 247.534282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.575181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.598596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.649777] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.664950] team0: Port device team_slave_1 added [ 247.677255] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.685391] team0: Port device team_slave_0 added [ 247.703123] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.709644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.716347] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.722857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.752034] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.763123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.818157] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.844781] team0: Port device team_slave_1 added [ 247.850455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.867854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.886119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.916987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.934249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.969625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.976584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.986989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.046797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.074257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.084855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.121496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.209382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.216578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.234754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.257158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.278549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.288493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.314895] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.337688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.358195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.378453] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.384877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.391655] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.398083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.411626] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.425249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.439283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.465699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.503066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.514593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.299659] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.306066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.312889] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.319297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.351425] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.427544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.876923] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.883377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.890200] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.896574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.912092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.934208] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.940646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.947367] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.953740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.966355] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.439454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.446781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.702999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.203815] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.388140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.701739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.709325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.717887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.909054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.946253] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.234397] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.325059] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.348061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.363440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.400666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.500576] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.800829] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.998779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.083397] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.100614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.122295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.160866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.402822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.514413] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.546984] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.577760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.584926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.634660] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.893243] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.024907] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.081362] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.097958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.105144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.392209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.417850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.425030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.569226] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.871575] 8021q: adding VLAN 0 to HW filter on device team0 00:59:17 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001a008100a00f80ecdb4cb904024865160b000000d4126efb12001d000800da1b40d819a9ffe200000000", 0x2e}], 0x1}, 0x0) pipe2$9p(&(0x7f0000000080), 0x4800) [ 257.455280] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 257.488467] netlink: 'syz-executor0': attribute type 29 has an invalid length. 00:59:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061108c00000000009510000000000000"], &(0x7f0000000100)='\a\\\xbcz\xfc\xa3\xaf\r\x8c`\xff\xff\x00\x00\xe9\x93\xedj\xaf\xb4\x8a\x8b\xf3O+\xeaS\xc7>j\x970\xf9[\v}\xa6\xf4\xdeY\x85\xdf\xdb\xf0\x85P\x92(+\x17L\xbc!x\x95\x9dk)e.\xd1\'\xd0\x9c\x16}\xf0\x88\xcf\x83\xc6\x12\'\'\x8e\x0f\xa8\xc2\xab\x98\x8f\x10\xa9\xf1\xd9#^K\x8fR~\x0f\xddLJ^j\xa1C\x1f\x06\xeb2\xa5aq', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x10000000000000}, 0x48) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x10001, 0x6200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x9248d3cf87e22c7d, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x8001}, 0x1c) 00:59:18 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req={0x7, 0x2, 0x96, 0x5}, 0x10) recvmsg(r1, &(0x7f0000002a00)={&(0x7f00000003c0)=@xdp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0x1, &(0x7f0000002900)=""/213, 0xd5}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) bind$can_raw(r1, &(0x7f0000000040), 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e00)) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="0000a8d4"], 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 00:59:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r2, r3+10000000}}) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21508}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 258.034739] usb usb1: usbfs: process 9463 (syz-executor1) did not claim interface 2 before use 00:59:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r2, r3+10000000}}) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21508}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 258.096232] usb usb1: usbfs: process 9471 (syz-executor1) did not claim interface 2 before use [ 258.229835] usb usb1: usbfs: process 9487 (syz-executor1) did not claim interface 2 before use 00:59:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r2, r3+10000000}}) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21508}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r2, r3+10000000}}) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21508}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 258.381557] usb usb1: usbfs: process 9501 (syz-executor1) did not claim interface 2 before use 00:59:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r2, r3+10000000}}) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21508}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 258.510578] usb usb1: usbfs: process 9515 (syz-executor1) did not claim interface 2 before use [ 258.605672] hrtimer: interrupt took 37056 ns [ 258.641416] usb usb1: usbfs: process 9527 (syz-executor1) did not claim interface 2 before use 00:59:19 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) r1 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x7, 0x2000) ioctl$KDSETLED(r1, 0x4b32, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000580)={0x80, 0x9, 0x400, 0x77a3, [], [], [], 0x1, 0x8, 0x8000, 0x40, "5fa239d9d00fb5c7264616dad6272275"}) ftruncate(r0, 0xa00000) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1f, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000340)=0x7, 0x4) getpeername$unix(r1, &(0x7f0000000480), &(0x7f0000000000)=0x6e) sendfile(r0, r0, &(0x7f0000000040), 0xff8) execve(&(0x7f0000000500)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000280)='\x88])+\x00'], &(0x7f00000001c0)=[&(0x7f0000000440)='\'vmnet0\x00', &(0x7f0000000540)='keyring+eth1\x00', &(0x7f0000000400)='\x88])+\x00']) 00:59:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x4000, 0x0) timer_create(0x6, &(0x7f00000002c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040)="226ba888730924a08423f49ee18cb30f6389282ae5df31768916f5f0d0f6ed1ca9476b7bfe674d7a5ad70f9d7c18edf70e784b8f9cb9606a35241c4706635b14d93849d7ce06", &(0x7f0000000140)="3651ed88"}}, &(0x7f0000044000)) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000280)) socket$inet6(0xa, 0x3, 0x3c) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000180)={0x6, 0xffff, @value}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000100)={0x0, 0x400}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000013c0)={0x0, r0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r5, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r5, 0x7, &(0x7f0000010000)) tkill(r1, 0x1000000000016) dup3(r4, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001440)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000010030000b8010000b801000000000000b801000000000000a0020000a0020000a0020000a0020000a002000004000000", @ANYPTR=&(0x7f0000001300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000ac1414bb00000000ffffffff7465616d5f736c6176655f310000000076657468310000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000009600c000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000f00000000000000ffffffffac1414aaffffff00ffffff006c6f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de00020000000000000000000000000000009800f80000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000800000002000000060000000000000000080000080000000200000007070000ff00000001000000000000000000000000000000e500000000000000000000007f000001ac14142100000000000000006263736830000000000000000000000069703667726530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x370) pwrite64(r0, &(0x7f0000001340)="bd0e4f07cd9bb4a756c9374115c9c2bfbb3dd6f796f30ce29bc15666ec0ca20eb52b1cfcaffeea7e48009deee4bba5edc42950a0ba43fecbb013586070636456dac146898ef95a622118b9d3847d7e4de530aec02f1a3ffe7ce23fbc31bb3cf1196a6ec4607fbb80bbbe0729d1651ca74aaf89af96", 0x75, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x8}, 0x28, 0x1) ioctl$GIO_FONT(r5, 0x4b60, &(0x7f0000000300)=""/4096) 00:59:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r1, r2+10000000}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:19 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000200)={{0x7, 0x3, 0x3ff, 0x9, 'syz1\x00', 0x40}, 0x0, [0x9, 0x10001, 0x3, 0x9cf, 0x7ff, 0xfffffffeffffffff, 0x3a2, 0x7, 0x400, 0x5673bb86, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x574, 0x7, 0x2, 0x18, 0x1, 0x1, 0x1800000, 0x6, 0x20, 0xfff, 0x3a, 0x1, 0x3, 0x4, 0x4, 0x4, 0x992, 0x8000, 0x5, 0x101, 0xfd6, 0x6, 0xffffffff, 0x0, 0x7, 0x400, 0x0, 0x5, 0x0, 0xff, 0x10000, 0x2, 0x9, 0x8, 0x6, 0x6, 0x1, 0x200, 0xcd7, 0x8, 0x3, 0x2, 0xe39d, 0xed, 0x5, 0xffffffffffffffe0, 0x8, 0x2609a335, 0x80000000, 0x100000000, 0x4, 0x1, 0x3ff, 0x3, 0x981, 0x8, 0x1, 0x1, 0x2, 0x1, 0x380000000000, 0x1000, 0x401, 0x8, 0x9, 0x8, 0x4, 0x3f, 0x4, 0x9, 0x5, 0x80000001, 0x9, 0x2, 0x4af3, 0x9, 0x5, 0x2d6b, 0x2, 0x2, 0x8, 0xfffffffffffffff9, 0x7, 0x5efd46af, 0xfffffffffffffffc, 0x100000001, 0x7fffffff, 0x7, 0x400, 0x1ff, 0x7f, 0xff, 0x4, 0x7, 0xfffffffffffffff9, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x4, 0xfffffffffffffffc, 0x101, 0x3, 0x14, 0x3f, 0x86, 0x9e01, 0x7fff, 0x4000000, 0x9], {r2, r3+10000000}}) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21508}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:19 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{}]}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2069c2, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) kexec_load(0x0, 0x10, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x0) 00:59:19 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) syz_open_pts(r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8000000000000, 0x0, 0x8000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) mount(&(0x7f0000000000)=@sg0='ubi:/sg0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 00:59:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8800, 0x8) ioctl$TCGETA(r0, 0x5405, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xa) [ 259.299817] Unknown ioctl 35083 [ 259.304962] Unknown ioctl 1074296581 [ 259.310719] Unknown ioctl 35083 00:59:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clock_gettime(0x0, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa0802, 0x0) fanotify_mark(r1, 0x2, 0x10, r0, 0x0) 00:59:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6}, &(0x7f000064b000)=0xa0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x204000, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x80000001, &(0x7f0000000080)=0x4) [ 259.371171] usb usb1: usbfs: process 9600 (syz-executor1) did not claim interface 2 before use [ 259.398728] usb usb1: usbfs: process 9602 (syz-executor0) did not claim interface 2 before use 00:59:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 259.470025] usb usb1: usbfs: process 9618 (syz-executor1) did not claim interface 2 before use 00:59:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x2004, 0x0) syz_open_pts(r0, 0x305000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000080)=0x8f, 0xfffffffffffffde1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="bb8e28c457dd0a765fc9ea2e36556ac007b091b5211d5eef62ae7ed603a6ffcf170ae9e09b2111e4fbb4b3a6871e1eb0ff0661321f02b379be2e444060bf337d9bb1449700ced0c58475fdd577465a3b9587cdbfddb067ea75fcac9328838d97197ae356bedc7f21f31a869e459a6bc17eea478d6dc45d6a5081803df050235124b0e29eb5fefd47", @ANYRES16=r3, @ANYBLOB="00032cbd7000fedbdf25010000000000000007410000001800180000ffff6574683a73797a6b616c6c6572300000"], 0x34}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5441, 0x0) 00:59:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000040)={0x2f}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80, [], 0xc}, @in6=@local, 0x4e20, 0xffffffffffffffff, 0x4e24, 0x1, 0x2, 0x80, 0x20, 0x4, r3, r4}, {0x9, 0x4, 0x3, 0x9, 0xfffffffffffffffc, 0x5, 0x10001, 0xfa7}, {0x2, 0x5, 0x0, 0x2}, 0x80000001, 0x6e6bb4, 0x2, 0x1, 0x2}, {{@in6, 0x4d6, 0x33}, 0xa, @in=@multicast2, 0x3502, 0x1, 0x1, 0x8, 0x8, 0x8, 0xc46e}}, 0xe8) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0xfffffe98) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x800000000000000, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x34010}], 0x1}}], 0x1, 0x0, 0x0) [ 259.539704] UBIFS error (pid: 9628): cannot open "ubi:/sg0", error -19 [ 259.610036] usb usb1: usbfs: process 9633 (syz-executor1) did not claim interface 2 before use [ 260.271882] UBIFS error (pid: 9654): cannot open "ubi:/sg0", error -19 00:59:22 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x103201, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = geteuid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x100000, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616f79792c7065726d69745f646972656374697f2c64656608006e2c646f6e7c5f686173682c646f6e745f61707072616973652c650000643c000000000000000000000000005e7c1ffcc723711696ee9debb38f3e52", @ANYRESDEC=0x0, @ANYBLOB=',fowner<', @ANYRESDEC=r2, @ANYBLOB="2c66736e616d653d6d656d6f72792e6576656e7473002c6673757569643d32777777003776002d37627a632d776530362d647f65312d65003b7f737f77002c686173682c00"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) epoll_wait(r4, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40) r6 = msgget$private(0x0, 0x400) msgctl$MSG_INFO(r6, 0xc, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYRES16=r6, @ANYRESHEX=r3], 0x14) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) 00:59:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0x6, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0), 0x1, 0x0) 00:59:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) r1 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x5, 0x5f, &(0x7f0000000500)="b6f7dcc4ab9daf2f525ff562a8264b804ebb53acae7c76c800c6a8097acaacbd88c47d664874432e91f24831696235203618901fecfd191ffa08be07257ee3793e586f4446b76df10d11f40ce7e272217d7e77eb2c4629b71c8e015574e069"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r2 = accept$alg(r0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x2000, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x8000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xf, 0x7, 0x5, 0x9, 0x25, r4, 0x7fff}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x4) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) ioctl$LOOP_SET_STATUS64(r7, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xbd}], 0x30}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000000c0)=""/235, &(0x7f0000000640)=0x143) 00:59:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x10001, 0x0) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000040)=0xe5, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000500)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000540)={r1, 0x0, r0}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x400101, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x9}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r0}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000600)={0x1, 'veth1\x00', 0x4}, 0x18) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000280)) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f00000002c0)=""/38, &(0x7f0000000300)=0x26) gettid() epoll_pwait(0xffffffffffffffff, &(0x7f0000000480)=[{}, {}, {}], 0x3, 0x2, &(0x7f00000004c0)={0x5}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f0000000400)="15961f559ede13b78c1dde2f6051ff7c7e58f1167180540e2a401c2300c53cdf6397a19594f1548926a883bf33ae4f8c0d5881670012914e73b223cc2ef96a31990c0cdda405716f04d1efd2aed9c2836129d8aa2ac590504e2e", 0x5a, 0xfffffffffffffffb) keyctl$invalidate(0x15, r5) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x3f00, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) mq_open(&(0x7f0000000080)='kmng\xd5\xf5\x0e\xd2$\x95\xc6\f\x94p\xcd$\xfd\x7f\xfe\x00\x00\x00\x00', 0x843, 0x0, &(0x7f0000000040)) 00:59:22 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) syz_open_pts(r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8000000000000, 0x0, 0x8000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) mount(&(0x7f0000000000)=@sg0='ubi:/sg0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 262.130165] usb usb1: usbfs: process 9662 (syz-executor1) did not claim interface 2 before use 00:59:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 262.268990] print_req_error: I/O error, dev loop0, sector 0 [ 262.274834] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.299367] print_req_error: I/O error, dev loop0, sector 0 [ 262.299382] usb usb1: usbfs: process 9680 (syz-executor1) did not claim interface 2 before use 00:59:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x10001, 0x0) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000040)=0xe5, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000500)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000540)={r1, 0x0, r0}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x400101, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x9}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r0}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000600)={0x1, 'veth1\x00', 0x4}, 0x18) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000280)) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f00000002c0)=""/38, &(0x7f0000000300)=0x26) gettid() epoll_pwait(0xffffffffffffffff, &(0x7f0000000480)=[{}, {}, {}], 0x3, 0x2, &(0x7f00000004c0)={0x5}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f0000000400)="15961f559ede13b78c1dde2f6051ff7c7e58f1167180540e2a401c2300c53cdf6397a19594f1548926a883bf33ae4f8c0d5881670012914e73b223cc2ef96a31990c0cdda405716f04d1efd2aed9c2836129d8aa2ac590504e2e", 0x5a, 0xfffffffffffffffb) keyctl$invalidate(0x15, r5) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x3f00, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) mq_open(&(0x7f0000000080)='kmng\xd5\xf5\x0e\xd2$\x95\xc6\f\x94p\xcd$\xfd\x7f\xfe\x00\x00\x00\x00', 0x843, 0x0, &(0x7f0000000040)) [ 262.313955] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.356679] print_req_error: I/O error, dev loop0, sector 0 [ 262.362552] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.378268] print_req_error: I/O error, dev loop0, sector 0 [ 262.384075] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.392719] usb usb1: usbfs: process 9689 (syz-executor1) did not claim interface 2 before use 00:59:22 executing program 1: syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 262.394200] UBIFS error (pid: 9688): cannot open "ubi:/sg0", error -19 [ 262.424735] print_req_error: I/O error, dev loop0, sector 0 [ 262.437252] Buffer I/O error on dev loop0, logical block 0, async page read 00:59:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x10001, 0x0) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000040)=0xe5, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000500)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000540)={r1, 0x0, r0}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x400101, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x9}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r0}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000600)={0x1, 'veth1\x00', 0x4}, 0x18) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000280)) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f00000002c0)=""/38, &(0x7f0000000300)=0x26) gettid() epoll_pwait(0xffffffffffffffff, &(0x7f0000000480)=[{}, {}, {}], 0x3, 0x2, &(0x7f00000004c0)={0x5}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f0000000400)="15961f559ede13b78c1dde2f6051ff7c7e58f1167180540e2a401c2300c53cdf6397a19594f1548926a883bf33ae4f8c0d5881670012914e73b223cc2ef96a31990c0cdda405716f04d1efd2aed9c2836129d8aa2ac590504e2e", 0x5a, 0xfffffffffffffffb) keyctl$invalidate(0x15, r5) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x3f00, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) mq_open(&(0x7f0000000080)='kmng\xd5\xf5\x0e\xd2$\x95\xc6\f\x94p\xcd$\xfd\x7f\xfe\x00\x00\x00\x00', 0x843, 0x0, &(0x7f0000000040)) [ 262.512461] print_req_error: I/O error, dev loop0, sector 0 [ 262.518282] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.579742] print_req_error: I/O error, dev loop0, sector 0 [ 262.585518] Buffer I/O error on dev loop0, logical block 0, async page read 00:59:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x10001, 0x0) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000040)=0xe5, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000500)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000540)={r1, 0x0, r0}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x400101, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x9}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r0}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000600)={0x1, 'veth1\x00', 0x4}, 0x18) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000280)) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f00000002c0)=""/38, &(0x7f0000000300)=0x26) gettid() epoll_pwait(0xffffffffffffffff, &(0x7f0000000480)=[{}, {}, {}], 0x3, 0x2, &(0x7f00000004c0)={0x5}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f0000000400)="15961f559ede13b78c1dde2f6051ff7c7e58f1167180540e2a401c2300c53cdf6397a19594f1548926a883bf33ae4f8c0d5881670012914e73b223cc2ef96a31990c0cdda405716f04d1efd2aed9c2836129d8aa2ac590504e2e", 0x5a, 0xfffffffffffffffb) keyctl$invalidate(0x15, r5) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x3f00, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) mq_open(&(0x7f0000000080)='kmng\xd5\xf5\x0e\xd2$\x95\xc6\f\x94p\xcd$\xfd\x7f\xfe\x00\x00\x00\x00', 0x843, 0x0, &(0x7f0000000040)) [ 262.624426] print_req_error: I/O error, dev loop0, sector 0 [ 262.630264] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.637617] ldm_validate_partition_table(): Disk read failed. [ 262.649036] syz-executor3 (9678) used greatest stack depth: 14600 bytes left [ 262.663993] print_req_error: I/O error, dev loop0, sector 0 00:59:22 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/33, 0x21) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x80000000) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000180)) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0xfffffffffffffffb) [ 262.669820] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.681933] print_req_error: I/O error, dev loop0, sector 0 [ 262.687844] Buffer I/O error on dev loop0, logical block 0, async page read [ 262.709647] Dev loop0: unable to read RDB block 0 [ 262.764366] loop0: unable to read partition table [ 262.783521] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 262.810123] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 262.851364] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted [ 262.874764] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 262.887434] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 00:59:23 executing program 0: r0 = msgget$private(0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='\x00', 0x1, 0x2) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000002c0)={0x0, 0x1, 0x4, &(0x7f0000000280)=0x4}) msgrcv(r0, &(0x7f0000000080)={0x0, ""/230}, 0xee, 0x2, 0x2000) msgsnd(r0, &(0x7f0000000240)={0x2}, 0x8, 0x0) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000380)={0x0, 0x0, 0x2080}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{0x3ff, 0x6, 0x20, 0x6}, {0xfffffffffffffb04, 0x9, 0x3, 0x7}, {0x2, 0xc4, 0x33, 0xb0}, {0x7, 0x9, 0x9, 0x10001}, {0xffffffffffffffff, 0xfffffffffffffff8, 0x0, 0x3ff}]}, 0x10) sendmsg$nl_crypto(r1, &(0x7f00000025c0)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x8401080}, 0xc, &(0x7f0000002580)={&(0x7f0000002440)=@upd={0x118, 0x12, 0x30, 0x70bd27, 0x25dfdbfb, {{'ctr-cast6-avx\x00'}, [], [], 0x2000, 0x400}, [{0x8, 0x1, 0x8001}, {0x8, 0x1, 0x6}, {0x8, 0x1, 0xfff}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x81}, {0x8}, {0x8, 0x1, 0x9}]}, 0x118}, 0x1, 0x0, 0x0, 0x24004050}, 0x40000) 00:59:23 executing program 1: r0 = syz_open_dev$usb(0x0, 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:23 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x420200) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9869, 0x3, 0x7}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0x13, 0xfff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6}, &(0x7f0000000280)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f00000000c0)) getpid() keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/65, 0x41) ioctl$NBD_DO_IT(r4, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) fcntl$setown(r2, 0x8, r3) syncfs(r0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_pts(r6, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000002c0)={'bridge0\x00'}) fcntl$setstatus(r7, 0x4, 0x102800) ioctl$TCXONC(r7, 0x540a, 0x0) write(r7, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x3) dup3(r7, r6, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, 0x0, &(0x7f0000000300)) syz_open_pts(r5, 0x0) write(r5, &(0x7f0000c34fff), 0xffffff0b) 00:59:23 executing program 2: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) r6 = dup2(r5, r3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) sendmsg$netlink(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000280)=[@rights={0x28, 0x1, 0x1, [r6, r1, r6, r4, r0]}, @rights={0x18, 0x1, 0x1, [r2, r0]}, @rights={0x10}, @rights={0x10}], 0x60}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x8, 0x7}, 0x14) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) fremovexattr(r5, 0x0) recvmmsg(r4, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x2, 0x62, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000003c00)) ioctl$KVM_SMI(r1, 0xaeb7) 00:59:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) r1 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x5, 0x5f, &(0x7f0000000500)="b6f7dcc4ab9daf2f525ff562a8264b804ebb53acae7c76c800c6a8097acaacbd88c47d664874432e91f24831696235203618901fecfd191ffa08be07257ee3793e586f4446b76df10d11f40ce7e272217d7e77eb2c4629b71c8e015574e069"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r2 = accept$alg(r0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x2000, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x8000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xf, 0x7, 0x5, 0x9, 0x25, r4, 0x7fff}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x4) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) ioctl$LOOP_SET_STATUS64(r7, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xbd}], 0x30}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000000c0)=""/235, &(0x7f0000000640)=0x143) 00:59:23 executing program 4: r0 = socket(0x5, 0x4, 0xfff) sendmsg$nfc_llcp(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x11bb, 0x352, "a7b4804c4fc5514e0d1a8a019b1d1f2382264ed5e6bb450107da5385f351e0d4c11f6b9716966e6bba3c1c17221582d760f04891dcdacd96fc1c0ea16299f1", 0x27}, 0x60, &(0x7f0000000280)=[{&(0x7f0000000080)="0b00dece1c622f1a5601cdd73cf4ad5047d555a9396481a0a83e9fd42a78eb1912e890e0ed71215911ec433486ecc6537542f19e17fbae25fd5bd1d7a52691fffe0e5b05", 0x44}, {&(0x7f0000000180)="e934040f0e47ef31146eaf22eddbb1641f52e55475a7125232c1c39e5906432f892bb48c49c068ed9c2237166ef9838d64b745568be67db2ca3ac85e927f07bd019697551cac1c1d001a0dc539af1577ded65f3a418a5b796d6d8d0b6b19d5de00301fd2f7d5a61166a81395990713f764b9b0d05e74159468affd1ae9ee4f88b9daa8c21c9941c0797797399372c913266211b7a349f11426fa17b25540ebe5cc9b1e29ea527529cb7ff0bf4fa60031a3cc1229f98affbfca58d4aba2378d4a97097e6f32608392a23be2ca7f9d23b07ed4b289bf4122536716612c0751f9b46e07cd46235ed5fc61f052260731203597eb1e", 0xf3}], 0x2, 0x0, 0x0, 0x840}, 0x20008001) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e280000000e0a43ba5d806055b6fdd80b40000000060001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 00:59:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x800000002009) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 263.115677] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. 00:59:23 executing program 2: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='(()^\x00') 00:59:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 263.250386] ldm_validate_partition_table(): Disk read failed. [ 263.293570] Dev loop0: unable to read RDB block 0 00:59:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000001000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 00:59:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400000, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 263.314115] loop0: unable to read partition table [ 263.356613] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 00:59:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) [ 263.550458] usb usb1: usbfs: process 9771 (syz-executor1) did not claim interface 2 before use 00:59:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00'}) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x145042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "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", 0x1000}, 0xf48) truncate(&(0x7f0000000040)='./file0\x00', 0x0) ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x7) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(r2, r2, &(0x7f00000000c0), 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000002c0)={r3, 0x8}, &(0x7f0000000300)=0x8) socket$kcm(0xa, 0x0, 0x11) 00:59:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@multicast2, @loopback}, 0x8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ustat(0xf, &(0x7f0000000000)) 00:59:24 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x420200) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9869, 0x3, 0x7}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0x13, 0xfff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6}, &(0x7f0000000280)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f00000000c0)) getpid() keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/65, 0x41) ioctl$NBD_DO_IT(r4, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) fcntl$setown(r2, 0x8, r3) syncfs(r0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_pts(r6, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000002c0)={'bridge0\x00'}) fcntl$setstatus(r7, 0x4, 0x102800) ioctl$TCXONC(r7, 0x540a, 0x0) write(r7, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x3) dup3(r7, r6, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, 0x0, &(0x7f0000000300)) syz_open_pts(r5, 0x0) write(r5, &(0x7f0000c34fff), 0xffffff0b) 00:59:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) r1 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x5, 0x5f, &(0x7f0000000500)="b6f7dcc4ab9daf2f525ff562a8264b804ebb53acae7c76c800c6a8097acaacbd88c47d664874432e91f24831696235203618901fecfd191ffa08be07257ee3793e586f4446b76df10d11f40ce7e272217d7e77eb2c4629b71c8e015574e069"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r2 = accept$alg(r0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x2000, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x8000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xf, 0x7, 0x5, 0x9, 0x25, r4, 0x7fff}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x4) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) ioctl$LOOP_SET_STATUS64(r7, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xbd}], 0x30}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000000c0)=""/235, &(0x7f0000000640)=0x143) 00:59:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:24 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x420200) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9869, 0x3, 0x7}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0x13, 0xfff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6}, &(0x7f0000000280)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f00000000c0)) getpid() keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/65, 0x41) ioctl$NBD_DO_IT(r4, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) fcntl$setown(r2, 0x8, r3) syncfs(r0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_pts(r6, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000002c0)={'bridge0\x00'}) fcntl$setstatus(r7, 0x4, 0x102800) ioctl$TCXONC(r7, 0x540a, 0x0) write(r7, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x3) dup3(r7, r6, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, 0x0, &(0x7f0000000300)) syz_open_pts(r5, 0x0) write(r5, &(0x7f0000c34fff), 0xffffff0b) [ 264.122509] kauditd_printk_skb: 3 callbacks suppressed [ 264.122524] audit: type=1800 audit(1545699564.367:31): pid=9797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16585 res=0 [ 264.151808] usb usb1: usbfs: process 9788 (syz-executor1) did not claim interface 2 before use 00:59:24 executing program 1: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000040)={0x100a1, 0x2}) 00:59:24 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x420200) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9869, 0x3, 0x7}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0x13, 0xfff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6}, &(0x7f0000000280)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f00000000c0)) getpid() keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/65, 0x41) ioctl$NBD_DO_IT(r4, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) fcntl$setown(r2, 0x8, r3) syncfs(r0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_pts(r6, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000002c0)={'bridge0\x00'}) fcntl$setstatus(r7, 0x4, 0x102800) ioctl$TCXONC(r7, 0x540a, 0x0) write(r7, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x3) dup3(r7, r6, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, 0x0, &(0x7f0000000300)) syz_open_pts(r5, 0x0) write(r5, &(0x7f0000c34fff), 0xffffff0b) 00:59:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, 0x0) 00:59:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x0, 0x2}) [ 264.843889] vhci_hcd: default hub control req: 0000 v0000 i0002 l0 00:59:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4000000000000007, 0x800000002009) syz_genetlink_get_family_id$net_dm(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x100a1}) 00:59:25 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x420200) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9869, 0x3, 0x7}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0x13, 0xfff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6}, &(0x7f0000000280)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f00000000c0)) getpid() keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/65, 0x41) ioctl$NBD_DO_IT(r4, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) fcntl$setown(r2, 0x8, r3) syncfs(r0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_pts(r6, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000002c0)={'bridge0\x00'}) fcntl$setstatus(r7, 0x4, 0x102800) ioctl$TCXONC(r7, 0x540a, 0x0) write(r7, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x3) dup3(r7, r6, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, 0x0, &(0x7f0000000300)) syz_open_pts(r5, 0x0) write(r5, &(0x7f0000c34fff), 0xffffff0b) [ 264.906908] audit: type=1800 audit(1545699565.147:32): pid=9830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16585 res=0 [ 265.021310] usb usb1: usbfs: process 9837 (syz-executor1) did not claim interface 0 before use [ 424.357489] INFO: task syz-executor0:9784 blocked for more than 140 seconds. [ 424.364902] Not tainted 4.20.0 #387 [ 424.369435] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 424.377902] syz-executor0 D23160 9784 7903 0x00000004 [ 424.383569] Call Trace: [ 424.386219] __schedule+0x86c/0x1ed0 [ 424.390499] ? __lock_acquire+0x62f/0x4c20 [ 424.394753] ? graph_lock+0x270/0x270 [ 424.398976] ? __sched_text_start+0x8/0x8 [ 424.403143] ? graph_lock+0x270/0x270 [ 424.406965] ? graph_lock+0x270/0x270 [ 424.411126] ? __debug_object_init+0x57d/0x1290 [ 424.415819] ? find_held_lock+0x36/0x1c0 [ 424.420174] schedule+0xfe/0x460 [ 424.423597] ? __mutex_lock+0xbe2/0x1700 [ 424.428059] ? __schedule+0x1ed0/0x1ed0 [ 424.432096] ? kasan_check_read+0x11/0x20 [ 424.436248] ? do_raw_spin_unlock+0xa7/0x330 [ 424.441188] ? do_raw_spin_trylock+0x270/0x270 [ 424.445787] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 424.450581] ? mutex_destroy+0x200/0x200 [ 424.454662] schedule_preempt_disabled+0x13/0x20 [ 424.459731] __mutex_lock+0xbe7/0x1700 [ 424.463693] ? blkdev_put+0x34/0x540 [ 424.467713] ? mutex_trylock+0x2b0/0x2b0 [ 424.471790] ? __lock_acquire+0x62f/0x4c20 [ 424.476045] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 424.481447] ? mark_held_locks+0x130/0x130 [ 424.485737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.491625] ? __call_rcu.constprop.55+0x3ea/0x950 [ 424.496571] ? __call_rcu.constprop.55+0x3ea/0x950 [ 424.501871] ? lockdep_hardirqs_on+0x421/0x5c0 [ 424.506464] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 424.512059] ? debug_object_deactivate+0x450/0x450 [ 424.517004] ? call_rcu+0xb/0x10 [ 424.520820] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 424.526282] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.532150] ? locks_remove_posix+0x47d/0x840 [ 424.536660] ? vfs_lock_file+0xe0/0xe0 [ 424.540962] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 424.546425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.552443] ? fsnotify+0x50e/0xef0 [ 424.556093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.562072] ? locks_remove_file+0x3c6/0x5c0 [ 424.566514] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 424.572533] ? ima_file_free+0x132/0x650 [ 424.576618] ? fsnotify_first_mark+0x350/0x350 [ 424.581577] ? blkdev_put+0x540/0x540 [ 424.585398] mutex_lock_nested+0x16/0x20 [ 424.589766] ? mutex_lock_nested+0x16/0x20 [ 424.594024] blkdev_put+0x34/0x540 [ 424.598484] ? blkdev_put+0x540/0x540 [ 424.602310] blkdev_close+0x8b/0xb0 [ 424.605971] __fput+0x385/0xa30 [ 424.609582] ? get_max_files+0x20/0x20 [ 424.613484] ? trace_hardirqs_on+0xbd/0x310 [ 424.618196] ? kasan_check_read+0x11/0x20 [ 424.622451] ? task_work_run+0x1af/0x2a0 [ 424.626518] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 424.632348] ? filp_close+0x1cd/0x250 [ 424.636207] ____fput+0x15/0x20 [ 424.639875] task_work_run+0x1e8/0x2a0 [ 424.643782] ? task_work_cancel+0x240/0x240 [ 424.648435] ? copy_fd_bitmaps+0x210/0x210 [ 424.652690] ? do_syscall_64+0x9a/0x820 [ 424.656679] exit_to_usermode_loop+0x318/0x380 [ 424.661619] ? syscall_trace_enter+0x1260/0x1260 [ 424.666421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.672310] do_syscall_64+0x6be/0x820 [ 424.676222] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 424.682037] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.687008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.692152] ? trace_hardirqs_on_caller+0x310/0x310 [ 424.697182] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 424.702584] ? prepare_exit_to_usermode+0x291/0x3b0 [ 424.707943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.712807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.718391] RIP: 0033:0x411211 [ 424.721610] Code: 44 00 ff 15 79 80 24 00 85 c0 41 89 c6 75 83 4c 8b 54 24 28 41 c7 44 24 60 01 00 00 00 49 83 c2 01 4c 89 54 24 28 e9 6f fa ff 49 8b 7c 24 70 8b 35 43 c4 24 00 ff 15 ed 83 24 00 85 c0 0f 85 [ 424.740841] RSP: 002b:00007fff28859070 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 424.748850] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000411211 [ 424.756142] RDX: 0000000000000000 RSI: 0000000000741be8 RDI: 0000000000000005 [ 424.763792] RBP: 0000000000000000 R08: 0000000000741be0 R09: 0000000000000000 [ 424.771416] R10: 00007fff28858f90 R11: 0000000000000293 R12: 0000000000000000 [ 424.779082] R13: 0000000000000001 R14: 0000000000000008 R15: 0000000000000000 [ 424.786381] INFO: task syz-executor0:9797 blocked for more than 140 seconds. [ 424.793882] Not tainted 4.20.0 #387 [ 424.798309] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 424.806290] syz-executor0 D22568 9797 7903 0x00000004 [ 424.812301] Call Trace: [ 424.814906] __schedule+0x86c/0x1ed0 [ 424.818950] ? mark_held_locks+0x130/0x130 [ 424.823221] ? __sched_text_start+0x8/0x8 [ 424.827665] ? print_usage_bug+0xc0/0xc0 [ 424.831755] ? mark_held_locks+0x130/0x130 [ 424.835992] ? graph_lock+0x270/0x270 [ 424.840166] ? graph_lock+0x270/0x270 [ 424.843999] ? find_held_lock+0x36/0x1c0 [ 424.848370] schedule+0xfe/0x460 [ 424.851747] ? __mutex_lock+0xbe2/0x1700 [ 424.855820] ? __schedule+0x1ed0/0x1ed0 [ 424.860133] ? kasan_check_read+0x11/0x20 [ 424.864295] ? do_raw_spin_unlock+0xa7/0x330 [ 424.869040] ? do_raw_spin_trylock+0x270/0x270 [ 424.873634] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 424.878520] ? mutex_destroy+0x200/0x200 [ 424.882617] schedule_preempt_disabled+0x13/0x20 [ 424.887723] __mutex_lock+0xbe7/0x1700 [ 424.891629] ? __blkdev_get+0x19b/0x13c0 [ 424.895704] ? mutex_trylock+0x2b0/0x2b0 [ 424.900192] ? graph_lock+0x270/0x270 [ 424.904009] ? graph_lock+0x270/0x270 [ 424.908142] ? __lock_acquire+0x62f/0x4c20 [ 424.912400] ? find_held_lock+0x36/0x1c0 [ 424.916511] ? get_gendisk+0xd2/0x380 [ 424.920825] ? lock_downgrade+0x900/0x900 [ 424.925004] ? lock_release+0xa00/0xa00 [ 424.929375] ? arch_local_save_flags+0x40/0x40 [ 424.933970] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 424.939339] ? get_disk_and_module+0xf0/0xf0 [ 424.943771] ? kasan_check_write+0x14/0x20 [ 424.948313] ? up_read+0x225/0x2c0 [ 424.951869] ? down_read+0x8d/0x120 [ 424.955536] ? up_read_non_owner+0x100/0x100 [ 424.960334] ? __down_interruptible+0x700/0x700 [ 424.965020] ? blkdev_ioctl+0x21b0/0x21b0 [ 424.969520] mutex_lock_nested+0x16/0x20 [ 424.973607] ? mutex_lock_nested+0x16/0x20 [ 424.978172] __blkdev_get+0x19b/0x13c0 [ 424.982081] ? blkdev_get_block+0xc0/0xc0 [ 424.986246] blkdev_get+0xc1/0xb50 [ 424.990139] ? bdget+0x5b0/0x5b0 [ 424.993519] ? do_raw_spin_trylock+0x270/0x270 [ 424.998489] ? apparmor_capable+0x6c0/0x6c0 [ 425.002832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.008725] ? errseq_sample+0xe5/0x130 [ 425.012714] ? _copy_to_user+0x110/0x110 [ 425.016786] ? _raw_spin_unlock+0x2c/0x50 [ 425.021272] blkdev_open+0x1fb/0x280 [ 425.025015] do_dentry_open+0x499/0x1250 [ 425.029513] ? bd_acquire+0x2c0/0x2c0 [ 425.033349] ? chown_common+0x730/0x730 [ 425.037689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.043283] ? security_inode_permission+0xd2/0x100 [ 425.048713] ? inode_permission+0xb2/0x560 [ 425.053029] vfs_open+0xa0/0xd0 [ 425.056326] path_openat+0x12bc/0x5160 [ 425.060565] ? rcu_softirq_qs+0x20/0x20 [ 425.064581] ? unwind_dump+0x190/0x190 [ 425.068847] ? path_lookupat.isra.43+0xc00/0xc00 [ 425.073621] ? unwind_get_return_address+0x61/0xa0 [ 425.078898] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 425.083930] ? expand_files.part.8+0x571/0x9a0 [ 425.088861] ? find_held_lock+0x36/0x1c0 [ 425.092963] ? __alloc_fd+0x347/0x6e0 [ 425.096790] ? lock_downgrade+0x900/0x900 [ 425.101362] ? getname+0x19/0x20 [ 425.104750] ? kasan_check_read+0x11/0x20 [ 425.109192] ? do_raw_spin_unlock+0xa7/0x330 [ 425.113609] ? do_raw_spin_trylock+0x270/0x270 [ 425.118506] ? __lock_is_held+0xb5/0x140 [ 425.122585] ? __check_object_size+0xb1/0x782 [ 425.127088] ? _raw_spin_unlock+0x2c/0x50 [ 425.131657] ? __alloc_fd+0x347/0x6e0 [ 425.135512] do_filp_open+0x255/0x380 [ 425.139799] ? may_open_dev+0x100/0x100 [ 425.143838] ? get_unused_fd_flags+0x122/0x1a0 [ 425.148775] ? __alloc_fd+0x6e0/0x6e0 [ 425.152609] do_sys_open+0x568/0x700 [ 425.156329] ? filp_open+0x80/0x80 [ 425.160181] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 425.165644] ? do_sys_ftruncate+0x449/0x550 [ 425.170247] __x64_sys_open+0x7e/0xc0 [ 425.174072] do_syscall_64+0x1b9/0x820 [ 425.178290] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.183660] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.188912] ? trace_hardirqs_on_caller+0x310/0x310 [ 425.193965] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 425.199352] ? recalc_sigpending_tsk+0x180/0x180 [ 425.204118] ? __switch_to_asm+0x40/0x70 [ 425.208458] ? __switch_to_asm+0x34/0x70 [ 425.212533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.217707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.222934] RIP: 0033:0x411391 [ 425.226142] Code: c0 89 c5 74 24 48 83 7b 08 00 74 0a 48 8d 7b 08 ff 15 db 81 24 00 48 83 3b 00 74 c1 48 89 df ff 15 6c 81 24 00 eb b6 66 90 48 <8b> 35 b1 c2 24 00 48 8b 3b ff 15 68 81 24 00 85 c0 89 c5 75 c6 48 [ 425.245411] RSP: 002b:00007fb0534b3a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 425.253453] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000411391 [ 425.261203] RDX: 00007fb0534b3afa RSI: 0000000000000002 RDI: 00007fb0534b3af0 [ 425.269292] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 425.276590] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000009 [ 425.284172] R13: 0000000000000001 R14: 00000000004da920 R15: 00000000ffffffff [ 425.291921] INFO: task syz-executor5:9793 blocked for more than 140 seconds. [ 425.299451] Not tainted 4.20.0 #387 [ 425.303614] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 425.311842] syz-executor5 D21960 9793 8062 0x00000004 [ 425.317840] Call Trace: [ 425.320458] __schedule+0x86c/0x1ed0 [ 425.324193] ? lockdep_hardirqs_on+0x421/0x5c0 [ 425.329113] ? retint_kernel+0x2d/0x2d [ 425.333038] ? __sched_text_start+0x8/0x8 [ 425.337202] ? _raw_spin_unlock_irq+0x60/0x80 [ 425.342067] ? finish_task_switch+0x1f4/0x910 [ 425.346600] ? finish_task_switch+0x1b4/0x910 [ 425.351424] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 425.356220] ? retint_kernel+0x2d/0x2d [ 425.360652] schedule+0xfe/0x460 [ 425.364055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 425.369144] ? __schedule+0x1ed0/0x1ed0 [ 425.373135] ? retint_kernel+0x2d/0x2d [ 425.377042] ? _raw_spin_unlock_irq+0x56/0x80 [ 425.382010] rwsem_down_read_failed+0x371/0x710 [ 425.386704] ? rt_mutex_futex_unlock+0x120/0x120 [ 425.391798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 425.396584] ? retint_kernel+0x2d/0x2d [ 425.400954] ? lock_acquire+0x268/0x520 [ 425.404964] ? arch_local_save_flags+0x40/0x40 [ 425.409894] ? __get_super.part.11+0x107/0x2e0 [ 425.414496] call_rwsem_down_read_failed+0x18/0x30 [ 425.419772] down_read+0x9b/0x120 [ 425.423248] ? __get_super.part.11+0x207/0x2e0 [ 425.428289] ? __down_interruptible+0x700/0x700 [ 425.432988] __get_super.part.11+0x207/0x2e0 [ 425.437734] get_super+0x2d/0x50 [ 425.441119] fsync_bdev+0x17/0xc0 [ 425.444586] invalidate_partition+0x35/0x60 [ 425.449214] drop_partitions.isra.14+0xe1/0x200 [ 425.453902] ? delete_partition+0x2c0/0x2c0 [ 425.458549] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 425.463352] rescan_partitions+0x72/0x8e0 [ 425.467914] __blkdev_reread_part+0x1ad/0x230 [ 425.472431] blkdev_reread_part+0x26/0x40 [ 425.476657] loop_reread_partitions+0x163/0x190 [ 425.481737] ? __loop_update_dio+0x6b0/0x6b0 [ 425.486174] loop_set_status+0xb95/0x1010 [ 425.490777] loop_set_status64+0xaa/0x100 [ 425.494959] ? loop_set_status_old+0x920/0x920 [ 425.499911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.505466] ? ns_capable_common+0x13f/0x170 [ 425.510185] lo_ioctl+0x90e/0x1d60 [ 425.513758] ? find_held_lock+0x36/0x1c0 [ 425.518153] ? lo_rw_aio_complete+0x470/0x470 [ 425.522668] blkdev_ioctl+0xd8a/0x21b0 [ 425.526576] ? blkpg_ioctl+0xc10/0xc10 [ 425.530864] ? lock_downgrade+0x900/0x900 [ 425.535024] ? check_preemption_disabled+0x48/0x280 [ 425.540376] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 425.545321] ? kasan_check_read+0x11/0x20 [ 425.549826] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 425.555118] ? rcu_softirq_qs+0x20/0x20 [ 425.559607] ? __fget+0x4d1/0x740 [ 425.563089] ? ksys_dup3+0x680/0x680 [ 425.566925] ? __might_fault+0x12b/0x1e0 [ 425.571336] ? lock_downgrade+0x900/0x900 [ 425.575511] block_ioctl+0xee/0x130 [ 425.579487] ? blkdev_fallocate+0x400/0x400 [ 425.583829] do_vfs_ioctl+0x1de/0x1790 [ 425.588196] ? ioctl_preallocate+0x300/0x300 [ 425.592635] ? __fget_light+0x2e9/0x430 [ 425.596642] ? fget_raw+0x20/0x20 [ 425.600570] ? _copy_to_user+0xc8/0x110 [ 425.604575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.610635] ? put_timespec64+0x10f/0x1b0 [ 425.614803] ? nsecs_to_jiffies+0x30/0x30 [ 425.619307] ? do_syscall_64+0x9a/0x820 [ 425.623292] ? do_syscall_64+0x9a/0x820 [ 425.627275] ? lockdep_hardirqs_on+0x421/0x5c0 [ 425.632209] ? security_file_ioctl+0x94/0xc0 [ 425.636671] ksys_ioctl+0xa9/0xd0 [ 425.640569] __x64_sys_ioctl+0x73/0xb0 [ 425.644475] do_syscall_64+0x1b9/0x820 [ 425.648700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.654082] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.659392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.664289] ? trace_hardirqs_on_caller+0x310/0x310 [ 425.669638] ? prepare_exit_to_usermode+0x291/0x3b0 [ 425.674678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.679955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.685154] RIP: 0033:0x457759 [ 425.688693] Code: Bad RIP value. [ 425.692085] RSP: 002b:00007f3104526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.700136] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457759 [ 425.707729] RDX: 0000000020000380 RSI: 0000000000004c04 RDI: 000000000000000e [ 425.715972] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 425.726759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f31045276d4 [ 425.734487] R13: 00000000004c0b14 R14: 00000000004d2358 R15: 00000000ffffffff [ 425.742101] [ 425.742101] Showing all locks held in the system: [ 425.748785] 1 lock held by khungtaskd/1023: [ 425.753122] #0: 00000000f7399fb9 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 425.762100] 1 lock held by rsyslogd/7779: [ 425.766251] #0: 00000000ba64f59c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 425.774639] 2 locks held by getty/7869: [ 425.778937] #0: 0000000092ec9df2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.787227] #1: 00000000ac4f63f8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.796611] 2 locks held by getty/7870: [ 425.800921] #0: 0000000082c6fbac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.809533] #1: 000000002926ca0a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.818733] 2 locks held by getty/7871: [ 425.822717] #0: 00000000dca55462 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.831289] #1: 00000000c2c1cd43 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.840611] 2 locks held by getty/7872: [ 425.844591] #0: 0000000033e8f64a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.853176] #1: 00000000acf18521 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.862466] 2 locks held by getty/7873: [ 425.866442] #0: 00000000924e699f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.875069] #1: 0000000032bb4936 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.884271] 2 locks held by getty/7874: [ 425.888588] #0: 0000000080a0b1fc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.896871] #1: 000000008ea24eae (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.906120] 2 locks held by getty/7875: [ 425.910451] #0: 000000006ce7c504 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 425.919069] #1: 0000000001ed7d9e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 425.928259] 1 lock held by syz-executor0/9784: [ 425.932851] #0: 0000000086e5ea64 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x34/0x540 [ 425.941146] 1 lock held by syz-executor0/9785: [ 425.945741] 1 lock held by syz-executor0/9797: [ 425.950689] #0: 0000000086e5ea64 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 425.959345] 3 locks held by syz-executor5/9793: [ 425.964020] #0: 00000000b5e344cb (&lo->lo_ctl_mutex/1){+.+.}, at: lo_ioctl+0x8e/0x1d60 [ 425.972492] #1: 0000000086e5ea64 (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 425.981578] #2: 0000000013f3f56a (&type->s_umount_key#47){.+.+}, at: __get_super.part.11+0x207/0x2e0 [ 425.991407] 1 lock held by blkid/9795: [ 425.995296] #0: 0000000086e5ea64 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x34/0x540 [ 426.003509] [ 426.005151] ============================================= [ 426.005151] [ 426.012467] NMI backtrace for cpu 0 [ 426.016113] CPU: 0 PID: 1023 Comm: khungtaskd Not tainted 4.20.0 #387 [ 426.022704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.032056] Call Trace: [ 426.034750] dump_stack+0x1d3/0x2c6 [ 426.038391] ? dump_stack_print_info.cold.1+0x20/0x20 [ 426.043596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.049208] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 426.054422] nmi_cpu_backtrace.cold.4+0x63/0xa2 [ 426.059102] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 426.064303] nmi_trigger_cpumask_backtrace+0x1c2/0x22c [ 426.069601] arch_trigger_cpumask_backtrace+0x14/0x20 [ 426.074802] watchdog+0xb51/0x1060 [ 426.078370] ? hungtask_pm_notify+0xb0/0xb0 [ 426.082703] ? __kthread_parkme+0xce/0x1a0 [ 426.086954] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 426.092064] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 426.097176] ? lockdep_hardirqs_on+0x421/0x5c0 [ 426.101770] ? trace_hardirqs_on+0xbd/0x310 [ 426.106096] ? kasan_check_read+0x11/0x20 [ 426.110251] ? __kthread_parkme+0xce/0x1a0 [ 426.114494] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 426.119953] ? preempt_schedule+0x4d/0x60 [ 426.124113] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 426.129227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.134788] ? __kthread_parkme+0xfb/0x1a0 [ 426.139037] ? hungtask_pm_notify+0xb0/0xb0 [ 426.143364] kthread+0x35a/0x440 [ 426.146734] ? kthread_bind+0x40/0x40 [ 426.150540] ret_from_fork+0x3a/0x50 [ 426.154370] Sending NMI from CPU 0 to CPUs 1: [ 426.160226] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.129 msecs [ 426.160931] NMI backtrace for cpu 1 [ 426.160938] CPU: 1 PID: 9785 Comm: syz-executor0 Not tainted 4.20.0 #387 [ 426.160946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.160951] RIP: 0010:__sanitizer_cov_trace_pc+0x26/0x50 [ 426.160964] Code: 5d c3 66 90 55 48 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 18 95 83 7e 81 e2 00 01 1f 00 75 2b 8b 90 d8 12 00 00 <83> fa 02 75 20 48 8b 88 e0 12 00 00 8b 80 dc 12 00 00 48 8b 11 48 [ 426.160969] RSP: 0018:ffff88817ec4f1e8 EFLAGS: 00000246 [ 426.160978] RAX: ffff88817ec42100 RBX: 0000000000000074 RCX: ffffffff81de750b [ 426.160984] RDX: 0000000000000002 RSI: ffffffff81de751e RDI: 0000000000000006 [ 426.160990] RBP: ffff88817ec4f1e8 R08: ffff88817ec42100 R09: ffffed103b5e5b77 [ 426.160996] R10: 0000000000000002 R11: ffff8881daf2dbbb R12: 0000000000000001 [ 426.161002] R13: ffffea0006aff3c0 R14: 0000000000000004 R15: dffffc0000000000 [ 426.161008] FS: 00007fb0534d5700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 [ 426.161013] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 426.161019] CR2: ffffffffff600400 CR3: 00000001c60ac000 CR4: 00000000001406e0 [ 426.161025] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 426.161031] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 426.161035] Call Trace: [ 426.161039] __getblk_gfp+0x87e/0xd50 [ 426.161043] ? prepare_to_wait+0x1b3/0x3f0 [ 426.161047] ? __find_get_block+0xf20/0xf20 [ 426.161051] ? io_schedule+0x1c/0x70 [ 426.161055] ? __wait_on_bit+0x92/0x130 [ 426.161074] ? ___might_sleep+0x1ed/0x300 [ 426.161078] ? __wait_on_bit+0x130/0x130 [ 426.161097] ? kasan_check_write+0x14/0x20 [ 426.161101] ? __brelse+0x104/0x180 [ 426.161105] ? block_commit_write+0x30/0x30 [ 426.161109] __bread_gfp+0x2d/0x300 [ 426.161113] fat__get_entry+0x5a6/0xa40 [ 426.161117] ? __put_user_ns+0x60/0x60 [ 426.161121] ? copy_overflow+0x30/0x30 [ 426.161125] ? inode_sb_list_add+0x213/0x2f0 [ 426.161129] ? lock_downgrade+0x900/0x900 [ 426.161134] fat_get_short_entry+0x13c/0x2c0 [ 426.161137] fat_subdirs+0x142/0x290 [ 426.161142] ? fat_ioctl_filldir+0x560/0x560 [ 426.161146] ? _raw_spin_unlock+0x2c/0x50 [ 426.161150] ? inode_sb_list_add+0x213/0x2f0 [ 426.161154] ? evict_inodes+0x610/0x610 [ 426.161157] ? no_open+0x10/0x10 [ 426.161161] ? _raw_spin_unlock+0x2c/0x50 [ 426.161165] fat_fill_super+0x2a9f/0x4310 [ 426.161170] ? fat_flush_inodes+0x1a0/0x1a0 [ 426.161175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.161179] ? vsnprintf+0x20d/0x1b60 [ 426.161182] ? pointer+0x900/0x900 [ 426.161186] ? snprintf+0xae/0xe0 [ 426.161190] ? vsprintf+0x40/0x40 [ 426.161194] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 426.161198] ? set_blocksize+0x2c1/0x340 [ 426.161202] msdos_fill_super+0x2e/0x40 [ 426.161206] mount_bdev+0x30c/0x3e0 [ 426.161210] ? msdos_mount+0x40/0x40 [ 426.161214] msdos_mount+0x34/0x40 [ 426.161217] mount_fs+0xae/0x31d [ 426.161222] vfs_kern_mount.part.35+0xdc/0x4f0 [ 426.161225] ? may_umount+0xb0/0xb0 [ 426.161230] ? _raw_read_unlock+0x2c/0x50 [ 426.161233] ? __get_fs_type+0x97/0xc0 [ 426.161237] do_mount+0x581/0x31f0 [ 426.161242] ? check_preemption_disabled+0x48/0x280 [ 426.161246] ? copy_mount_string+0x40/0x40 [ 426.161250] ? copy_mount_options+0x5f/0x430 [ 426.161255] ? rcu_read_lock_sched_held+0x108/0x120 [ 426.161259] ? kmem_cache_alloc_trace+0x353/0x750 [ 426.161264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.161268] ? _copy_from_user+0xdf/0x150 [ 426.161273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.161277] ? copy_mount_options+0x315/0x430 [ 426.161281] ksys_mount+0x12d/0x140 [ 426.161285] __x64_sys_mount+0xbe/0x150 [ 426.161289] do_syscall_64+0x1b9/0x820 [ 426.161294] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 426.161298] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.161303] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.161307] ? trace_hardirqs_on_caller+0x310/0x310 [ 426.161312] ? prepare_exit_to_usermode+0x291/0x3b0 [ 426.161316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.161321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.161324] RIP: 0033:0x45a1ca [ 426.161338] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 426.161342] RSP: 002b:00007fb0534d4a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 426.161353] RAX: ffffffffffffffda RBX: 00007fb0534d4b30 RCX: 000000000045a1ca [ 426.161359] RDX: 00007fb0534d4ad0 RSI: 0000000020000100 RDI: 00007fb0534d4af0 [ 426.161365] RBP: 0000000020000100 R08: 00007fb0534d4b30 R09: 00007fb0534d4ad0 [ 426.161371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 426.161376] R13: 0000000000000000 R14: 00000000004da920 R15: 00000000ffffffff [ 426.166677] Kernel panic - not syncing: hung_task: blocked tasks [ 426.626926] CPU: 0 PID: 1023 Comm: khungtaskd Not tainted 4.20.0 #387 [ 426.633504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.642856] Call Trace: [ 426.645459] dump_stack+0x1d3/0x2c6 [ 426.649098] ? dump_stack_print_info.cold.1+0x20/0x20 [ 426.654387] panic+0x2ad/0x55c [ 426.657594] ? add_taint.cold.5+0x16/0x16 [ 426.661770] ? nmi_trigger_cpumask_backtrace+0x1a2/0x22c [ 426.667221] ? nmi_trigger_cpumask_backtrace+0x1fe/0x22c [ 426.672677] ? nmi_trigger_cpumask_backtrace+0x1ab/0x22c [ 426.678131] ? nmi_trigger_cpumask_backtrace+0x1a2/0x22c [ 426.683601] watchdog+0xb62/0x1060 [ 426.687161] ? hungtask_pm_notify+0xb0/0xb0 [ 426.691490] ? __kthread_parkme+0xce/0x1a0 [ 426.695728] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 426.700840] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 426.705949] ? lockdep_hardirqs_on+0x421/0x5c0 [ 426.710541] ? trace_hardirqs_on+0xbd/0x310 [ 426.714887] ? kasan_check_read+0x11/0x20 [ 426.719040] ? __kthread_parkme+0xce/0x1a0 [ 426.723315] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 426.728780] ? preempt_schedule+0x4d/0x60 [ 426.732974] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 426.738099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.743699] ? __kthread_parkme+0xfb/0x1a0 [ 426.747949] ? hungtask_pm_notify+0xb0/0xb0 [ 426.752274] kthread+0x35a/0x440 [ 426.755650] ? kthread_bind+0x40/0x40 [ 426.759464] ret_from_fork+0x3a/0x50 [ 426.764123] Kernel Offset: disabled [ 426.767752] Rebooting in 86400 seconds..