[ OK ] Started Getty on tty1. [ OK ] Found device /dev/ttyS0. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Started OpenBSD Secure Shell server. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.29' (ECDSA) to the list of known hosts. 2020/12/15 09:23:50 fuzzer started 2020/12/15 09:23:51 dialing manager at 10.128.0.26:42175 2020/12/15 09:23:51 syscalls: 3495 2020/12/15 09:23:51 code coverage: enabled 2020/12/15 09:23:51 comparison tracing: enabled 2020/12/15 09:23:51 extra coverage: enabled 2020/12/15 09:23:51 setuid sandbox: enabled 2020/12/15 09:23:51 namespace sandbox: enabled 2020/12/15 09:23:51 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/15 09:23:51 fault injection: enabled 2020/12/15 09:23:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/15 09:23:51 net packet injection: enabled 2020/12/15 09:23:51 net device setup: enabled 2020/12/15 09:23:51 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/15 09:23:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/15 09:23:51 USB emulation: enabled 2020/12/15 09:23:51 hci packet injection: enabled 2020/12/15 09:23:51 wifi device emulation: enabled 09:26:29 executing program 0: io_uring_setup(0x100341, &(0x7f0000000040)={0x0, 0x0, 0x10}) 09:26:29 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/mdstat\x00', 0x0, 0x0) 09:26:29 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001a00)={{0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff}) 09:26:30 executing program 3: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xffffffffffffff7d, 0x200000) 09:26:30 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x1204, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffeffff, 0x9}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000004, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) 09:26:30 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10}, 0x10}}, 0x0) syzkaller login: [ 211.393613][ T8477] IPVS: ftp: loaded support on port[0] = 21 [ 211.598213][ T8477] chnl_net:caif_netlink_parms(): no params data found [ 211.673801][ T8479] IPVS: ftp: loaded support on port[0] = 21 [ 211.815922][ T8477] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.828988][ T8481] IPVS: ftp: loaded support on port[0] = 21 [ 211.835955][ T8477] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.846205][ T8477] device bridge_slave_0 entered promiscuous mode [ 211.858476][ T8477] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.866117][ T8477] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.873940][ T8477] device bridge_slave_1 entered promiscuous mode [ 211.934243][ T8477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.948018][ T8477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.047603][ T8477] team0: Port device team_slave_0 added [ 212.088985][ T8483] IPVS: ftp: loaded support on port[0] = 21 [ 212.124700][ T8477] team0: Port device team_slave_1 added [ 212.154939][ T8479] chnl_net:caif_netlink_parms(): no params data found [ 212.174270][ T8477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.184125][ T8477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.210316][ T8477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.245078][ T8477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.253220][ T8477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.279857][ T8477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 212.444040][ T8485] IPVS: ftp: loaded support on port[0] = 21 [ 212.551587][ T8481] chnl_net:caif_netlink_parms(): no params data found [ 212.600784][ T8477] device hsr_slave_0 entered promiscuous mode [ 212.609207][ T8477] device hsr_slave_1 entered promiscuous mode [ 212.616956][ T8479] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.624505][ T8479] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.633690][ T8479] device bridge_slave_0 entered promiscuous mode [ 212.646775][ T8479] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.655304][ T8479] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.663816][ T8479] device bridge_slave_1 entered promiscuous mode [ 212.686148][ T8493] IPVS: ftp: loaded support on port[0] = 21 [ 212.752028][ T8479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.784234][ T8479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.873175][ T8479] team0: Port device team_slave_0 added [ 212.888235][ T8481] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.895699][ T8481] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.904432][ T8481] device bridge_slave_0 entered promiscuous mode [ 212.913475][ T8481] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.920995][ T8481] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.928664][ T8481] device bridge_slave_1 entered promiscuous mode [ 212.946008][ T8479] team0: Port device team_slave_1 added [ 213.007096][ T8481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.034653][ T8481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.107484][ T8481] team0: Port device team_slave_0 added [ 213.146785][ T8479] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.154277][ T8479] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.181733][ T8479] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.201324][ T8481] team0: Port device team_slave_1 added [ 213.229290][ T8479] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.241678][ T8479] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.269243][ T8479] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.293011][ T8483] chnl_net:caif_netlink_parms(): no params data found [ 213.357986][ T8479] device hsr_slave_0 entered promiscuous mode [ 213.368305][ T8479] device hsr_slave_1 entered promiscuous mode [ 213.375331][ T8479] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.384193][ T8479] Cannot create hsr debugfs directory [ 213.405328][ T5] Bluetooth: hci0: command 0x0409 tx timeout [ 213.425652][ T8481] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.434969][ T8481] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.461189][ T8481] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.474922][ T8481] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.482108][ T8481] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.508421][ T8481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.527099][ T8485] chnl_net:caif_netlink_parms(): no params data found [ 213.608247][ T8481] device hsr_slave_0 entered promiscuous mode [ 213.615266][ T8481] device hsr_slave_1 entered promiscuous mode [ 213.622665][ T8481] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.630501][ T8481] Cannot create hsr debugfs directory [ 213.640035][ T8438] Bluetooth: hci1: command 0x0409 tx timeout [ 213.749897][ T8483] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.757080][ T8483] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.766717][ T8483] device bridge_slave_0 entered promiscuous mode [ 213.780416][ T8483] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.787485][ T8483] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.795569][ T8483] device bridge_slave_1 entered promiscuous mode [ 213.802589][ T2991] Bluetooth: hci2: command 0x0409 tx timeout [ 213.861786][ T8493] chnl_net:caif_netlink_parms(): no params data found [ 213.902016][ T8483] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.917184][ T8483] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.929178][ T8485] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.937053][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.946149][ T8485] device bridge_slave_0 entered promiscuous mode [ 213.981863][ T8477] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 214.013004][ T8485] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.021457][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.029093][ T8485] device bridge_slave_1 entered promiscuous mode [ 214.039621][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 214.058425][ T8477] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 214.088885][ T8483] team0: Port device team_slave_0 added [ 214.108593][ T8485] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.121147][ T8485] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.138465][ T8477] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 214.161742][ T8483] team0: Port device team_slave_1 added [ 214.177540][ T8477] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 214.231035][ T8485] team0: Port device team_slave_0 added [ 214.241795][ T8485] team0: Port device team_slave_1 added [ 214.282324][ T8493] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.296613][ T8493] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.305445][ T8493] device bridge_slave_0 entered promiscuous mode [ 214.328221][ T8483] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 214.335623][ T8483] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.364184][ T8483] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 214.369816][ T5] Bluetooth: hci4: command 0x0409 tx timeout [ 214.392269][ T8493] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.399335][ T8493] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.408924][ T8493] device bridge_slave_1 entered promiscuous mode [ 214.435611][ T8483] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 214.442786][ T8483] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.469238][ T8483] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 214.497352][ T8493] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.507099][ T8485] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 214.515686][ T8485] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.519671][ T2991] Bluetooth: hci5: command 0x0409 tx timeout [ 214.544024][ T8485] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 214.579147][ T8493] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.588810][ T8485] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 214.596021][ T8485] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.624407][ T8485] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 214.681204][ T8493] team0: Port device team_slave_0 added [ 214.691357][ T8493] team0: Port device team_slave_1 added [ 214.718676][ T8483] device hsr_slave_0 entered promiscuous mode [ 214.725692][ T8483] device hsr_slave_1 entered promiscuous mode [ 214.734486][ T8483] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.742511][ T8483] Cannot create hsr debugfs directory [ 214.783032][ T8485] device hsr_slave_0 entered promiscuous mode [ 214.791904][ T8485] device hsr_slave_1 entered promiscuous mode [ 214.800322][ T8485] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.807914][ T8485] Cannot create hsr debugfs directory [ 214.846540][ T8493] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 214.853822][ T8493] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.880235][ T8493] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 214.905726][ T8479] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 214.946576][ T8493] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 214.955349][ T8493] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.982854][ T8493] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 214.998662][ T8479] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 215.044592][ T8479] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 215.075728][ T8481] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 215.105333][ T8479] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 215.119831][ T8481] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 215.135476][ T8493] device hsr_slave_0 entered promiscuous mode [ 215.143307][ T8493] device hsr_slave_1 entered promiscuous mode [ 215.152007][ T8493] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 215.159709][ T8493] Cannot create hsr debugfs directory [ 215.187566][ T8481] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 215.197504][ T8481] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 215.413157][ T8477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.467056][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.477015][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.492373][ T8477] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.499622][ T9653] Bluetooth: hci0: command 0x041b tx timeout [ 215.522326][ T8485] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 215.560038][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.575749][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.584704][ T8438] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.591963][ T8438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.605383][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.627612][ T8485] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 215.649343][ T8481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.677029][ T8485] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 215.694977][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.704521][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.713498][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.720657][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.729639][ T9653] Bluetooth: hci1: command 0x041b tx timeout [ 215.746185][ T8479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.766106][ T8485] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 215.795673][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.804131][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.813232][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.823101][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.832549][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.842013][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.855083][ T8481] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.876340][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.888922][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.899891][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.921654][ T9653] Bluetooth: hci2: command 0x041b tx timeout [ 215.932631][ T8479] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.959742][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.968420][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.986758][ T9653] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.993918][ T9653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.005986][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.014976][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.024475][ T9653] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.031608][ T9653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.039163][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.048203][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.056132][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.064828][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.075339][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.084729][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.098058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.107300][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.115524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.124526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.134757][ T7] Bluetooth: hci3: command 0x041b tx timeout [ 216.135916][ T8483] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 216.166262][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.175440][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.187992][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.195146][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.223435][ T8483] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 216.247641][ T8483] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 216.258744][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.273410][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.283104][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.292187][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.301619][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.310380][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.318582][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.327525][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.336641][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.345389][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.352569][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.360674][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.369147][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.384270][ T8481] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.398294][ T8481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.413540][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.432612][ T8483] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 216.440793][ T7] Bluetooth: hci4: command 0x041b tx timeout [ 216.454107][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.463373][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.471838][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.481014][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.489328][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.499158][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.508798][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.563099][ T8479] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 216.575080][ T8479] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.592807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.601752][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.609210][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.610222][ T17] Bluetooth: hci5: command 0x041b tx timeout [ 216.617881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.632896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.642102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.650959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.688577][ T8493] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 216.715753][ T8481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.724112][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.733259][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.746909][ T8477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.758781][ T8493] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 216.792032][ T8493] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 216.806716][ T8493] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 216.824871][ T8485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.849273][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.857227][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.899163][ T8479] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.935203][ T8485] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.944905][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.952831][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.962108][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.971501][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.040929][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.050969][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.059408][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.068866][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.080800][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.089971][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.098323][ T9653] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.105477][ T9653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.115175][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.124604][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.133372][ T9653] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.140500][ T9653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.148560][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.197381][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.206537][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.218033][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.228231][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.237443][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.247106][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.256215][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.264817][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.278028][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.286640][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.294948][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.303426][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.311514][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.324792][ T8477] device veth0_vlan entered promiscuous mode [ 217.356793][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.365517][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.374903][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.385923][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.395172][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.405364][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.414114][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.422928][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.433338][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.441854][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.454211][ T8479] device veth0_vlan entered promiscuous mode [ 217.460997][ T8481] device veth0_vlan entered promiscuous mode [ 217.477518][ T8485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.505122][ T8493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.518317][ T8479] device veth1_vlan entered promiscuous mode [ 217.537816][ T8477] device veth1_vlan entered promiscuous mode [ 217.560497][ T2991] Bluetooth: hci0: command 0x040f tx timeout [ 217.572231][ T8481] device veth1_vlan entered promiscuous mode [ 217.599162][ T8493] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.659389][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.670450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.678486][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.690864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.698792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.708565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.716980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.726278][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.734672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.744443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.769142][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.778542][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.788921][ T9775] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.796066][ T9775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.800321][ T2991] Bluetooth: hci1: command 0x040f tx timeout [ 217.816499][ T8485] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.841160][ T8483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.848149][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.857310][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.868062][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.877761][ T9653] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.884921][ T9653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.899919][ T8477] device veth0_macvtap entered promiscuous mode [ 217.916056][ T8479] device veth0_macvtap entered promiscuous mode [ 217.935944][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.945257][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.954608][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.963343][ T2991] Bluetooth: hci2: command 0x040f tx timeout [ 217.964013][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.978932][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.990390][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.998170][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.007341][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.015839][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.028828][ T8477] device veth1_macvtap entered promiscuous mode [ 218.049092][ T8483] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.080322][ T8479] device veth1_macvtap entered promiscuous mode [ 218.087932][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.099064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.108062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.116617][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.125972][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.134792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.148080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.156536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.194117][ T8481] device veth0_macvtap entered promiscuous mode [ 218.211329][ T9653] Bluetooth: hci3: command 0x040f tx timeout [ 218.218015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.228969][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.238338][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.245555][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.253868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.263067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.271865][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.278905][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.287628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.296623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.328277][ T8477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.348844][ T8479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.361429][ T8479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.374334][ T8479] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.385936][ T8479] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.394443][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.403909][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.413001][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.423450][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.433804][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.444896][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.454204][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.465219][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.474414][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.484166][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.493747][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.503299][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.513683][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.524031][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.542286][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.552877][ T9775] Bluetooth: hci4: command 0x040f tx timeout [ 218.559360][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.573537][ T8477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.589887][ T8493] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.601386][ T8493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.611371][ T8481] device veth1_macvtap entered promiscuous mode [ 218.622751][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.631181][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.638885][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.649160][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.657923][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.666928][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.676146][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.686062][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.696736][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.705777][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.717788][ T8483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.728048][ T9653] Bluetooth: hci5: command 0x040f tx timeout [ 218.739687][ T8477] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.748397][ T8477] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.761021][ T8477] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.773262][ T8477] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.791774][ T8479] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.801357][ T8479] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.816828][ T8479] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.825656][ T8479] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.861520][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.875689][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.884935][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.896938][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.005443][ T8481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.023037][ T8481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.033972][ T8481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.044640][ T8481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.056442][ T8481] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 219.068002][ T8481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.078965][ T8481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.092135][ T8481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.102903][ T8481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.114714][ T8481] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.138865][ T8485] device veth0_vlan entered promiscuous mode [ 219.160784][ T8493] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.179254][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.190462][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.199170][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.222495][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.232985][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.250765][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.267275][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.275224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.294142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.302918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.314743][ T8481] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.325217][ T8481] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.334399][ T8481] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.343461][ T8481] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.375679][ T8483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.461373][ T8485] device veth1_vlan entered promiscuous mode [ 219.504482][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 219.530825][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.539552][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 219.550277][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.639249][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 219.651631][ T9775] Bluetooth: hci0: command 0x0419 tx timeout [ 219.668092][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.679100][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.721102][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 219.721507][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.729061][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 219.738945][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.752540][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.762041][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.814514][ T8483] device veth0_vlan entered promiscuous mode [ 219.837738][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 219.858846][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 219.889765][ T9653] Bluetooth: hci1: command 0x0419 tx timeout [ 219.896137][ T210] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 219.899882][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 219.913858][ T210] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 219.926562][ T8485] device veth0_macvtap entered promiscuous mode [ 219.947484][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 219.958719][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 219.968388][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.977666][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.986459][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.995263][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.004958][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.014457][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.023313][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.046989][ T8493] device veth0_vlan entered promiscuous mode [ 220.055141][ T9653] Bluetooth: hci2: command 0x0419 tx timeout [ 220.072086][ T8485] device veth1_macvtap entered promiscuous mode [ 220.084321][ T8483] device veth1_vlan entered promiscuous mode [ 220.120720][ T210] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 220.128722][ T210] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 220.175953][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.187966][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 220.197951][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.207403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 220.216744][ T8493] device veth1_vlan entered promiscuous mode [ 220.252617][ T8485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.274488][ T8485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.290706][ T9653] Bluetooth: hci3: command 0x0419 tx timeout [ 220.295334][ T8485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.307303][ T8485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.317323][ T8485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.327834][ T8485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:26:39 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f000000b140)) [ 220.354966][ T8485] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 220.374976][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.380965][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 220.391606][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.404326][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.408079][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 220.420574][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.433273][ T8485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.449012][ T8485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.474891][ T8485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.505532][ T8485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.529652][ T8485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 09:26:39 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 09:26:39 executing program 1: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 220.553864][ T8485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.587581][ T8485] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 220.600067][ T7] Bluetooth: hci4: command 0x0419 tx timeout 09:26:40 executing program 0: socket(0x23, 0x0, 0x80000001) [ 220.644244][ T8483] device veth0_macvtap entered promiscuous mode [ 220.675485][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 220.688814][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.710309][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.736509][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.762782][ T8485] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 09:26:40 executing program 0: r0 = socket(0x2, 0x3, 0x9) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000f00)={&(0x7f0000000dc0), 0xc, &(0x7f0000000ec0)={0x0}}, 0x0) [ 220.795435][ T7] Bluetooth: hci5: command 0x0419 tx timeout [ 220.797148][ T8485] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.813904][ T8485] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.824459][ T8485] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:26:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x1) [ 220.851950][ T8483] device veth1_macvtap entered promiscuous mode [ 220.898607][ T8493] device veth0_macvtap entered promiscuous mode [ 220.914623][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.931290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.942019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.990305][ T8493] device veth1_macvtap entered promiscuous mode [ 221.016210][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.037961][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.050207][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.070814][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:26:40 executing program 1: r0 = socket(0x2, 0x5, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, 0x0, 0x0) [ 221.092406][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.103195][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.113117][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.124135][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:26:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x64, &(0x7f0000000140)=0x5, 0x4) [ 221.138263][ T8483] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.149118][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.157726][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.173676][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 09:26:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) [ 221.200350][ T9775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.245914][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.269504][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.279338][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.294973][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.305414][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.317124][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.338830][ T8483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.360824][ T8483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.381644][ T8483] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.429107][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.441818][ T9653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.486062][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.545001][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.579921][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.609661][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.626540][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.638040][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.649064][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.661500][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.673694][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.684907][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.698434][ T8493] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.718572][ T8483] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.731296][ T8483] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.741448][ T8483] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.750500][ T8483] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.785834][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.795479][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.812930][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.824692][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.835356][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.846157][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.856159][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.866947][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.877282][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.889715][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.900294][ T8493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.911458][ T8493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.923141][ T8493] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.957385][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.976971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.010804][ T8493] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.019742][ T8493] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.028426][ T8493] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.038420][ T8493] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.068416][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.110172][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.196672][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 222.213066][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.252211][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.266069][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 222.266254][ T149] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.332852][ T149] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.370544][ T33] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.378517][ T33] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.425943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 222.438178][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 222.448744][ T9969] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 222.479771][ T36] audit: type=1804 audit(1608024401.771:2): pid=9969 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/0/file0/bus" dev="loop4" ino=3 res=1 errno=0 [ 222.527193][ T33] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.538623][ T210] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.561629][ T33] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.573600][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 222.592898][ T36] audit: type=1804 audit(1608024401.891:3): pid=9969 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/0/file0/bus" dev="loop4" ino=3 res=1 errno=0 [ 222.600270][ T210] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.629437][ C1] hrtimer: interrupt took 57386 ns [ 222.647263][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 222.673493][ T36] audit: type=1804 audit(1608024401.971:4): pid=9974 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/0/file0/bus" dev="loop4" ino=3 res=1 errno=0 09:26:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 09:26:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='lock_acquire\x00', r0}, 0x10) semget$private(0x0, 0x2, 0x0) 09:26:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8921, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:42 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 09:26:42 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) 09:26:42 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x1204, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffeffff, 0x9}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000004, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) [ 222.713167][ T36] audit: type=1804 audit(1608024402.001:5): pid=9974 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/0/file0/bus" dev="loop4" ino=3 res=1 errno=0 [ 222.780200][ T210] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 09:26:42 executing program 5: keyctl$join(0x11, 0x0) 09:26:42 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/162, 0x0, 0xa2}, 0x20) 09:26:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000001c0)=""/162, 0x2a, 0xa2, 0x1}, 0x20) 09:26:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f00000009c0)={[], [{@pcr={'pcr'}}, {@obj_type={'obj_type', 0x3d, 'NLBL_CALIPSO\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '-@:'}}]}) [ 223.028291][ T9996] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 223.111083][ T36] audit: type=1804 audit(1608024402.411:6): pid=9996 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/1/file0/bus" dev="loop4" ino=5 res=1 errno=0 09:26:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000780)=[{&(0x7f0000000200), 0x0, 0x101}, {&(0x7f00000005c0)="2a97809aa6c7062a52d2e37c6711c40eff407768e69493663ad2ee17387bf459b439d7d2ddf83709fcd216776847a0f676bef6eb856fe46e4baa84f678d10afe5ad39d76", 0x44, 0x3}], 0x2000008, &(0x7f0000000800)={[{@nocompress='nocompress'}, {@block={'block', 0x3d, 0xc00}}, {@map_off='map=off'}, {@cruft='cruft'}, {@norock='norock'}, {@uid={'uid', 0x3d, 0xee00}}, {@session={'session'}}, {@check_strict='check=strict'}, {@nojoliet='nojoliet'}], [{@pcr={'pcr', 0x3d, 0x34}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@measure='measure'}, {@obj_role={'obj_role'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) 09:26:42 executing program 0: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x541b) 09:26:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f00000003c0)=ANY=[]}) [ 223.278761][ T36] audit: type=1804 audit(1608024402.571:7): pid=10006 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/1/file0/bus" dev="loop4" ino=5 res=1 errno=0 [ 223.317373][T10010] erofs: Unknown parameter 'pcr' 09:26:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum]}}, &(0x7f0000000440)=""/180, 0x3a, 0xb4, 0x1}, 0x20) 09:26:42 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x1204, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffeffff, 0x9}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000004, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) 09:26:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8903, &(0x7f00000000c0)={'erspan0\x00', 0x0}) [ 223.409065][T10010] erofs: Unknown parameter 'pcr' 09:26:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f00000003c0)=ANY=[]}) 09:26:42 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cachefiles\x00', 0x20881, 0x0) 09:26:42 executing program 3: setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f00000000c0), 0xfffffffffffffcfb) 09:26:42 executing program 1: socketpair(0x2c, 0x3, 0x2, &(0x7f0000000240)) [ 223.538832][ T210] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 223.587081][ T36] audit: type=1800 audit(1608024402.881:8): pid=10020 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=7 res=0 errno=0 09:26:43 executing program 2: prctl$PR_SET_PDEATHSIG(0x28, 0x400000000000029) 09:26:43 executing program 3: prctl$PR_SET_PDEATHSIG(0x27, 0x0) 09:26:43 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000440)=""/180, 0x2e, 0xb4, 0x1}, 0x20) 09:26:43 executing program 1: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x6, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "76161633"}, 0x0, 0x0, @userptr}) 09:26:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) [ 223.912858][T10047] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 224.033610][ T36] audit: type=1804 audit(1608024403.331:9): pid=10047 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/2/file0/bus" dev="loop4" ino=8 res=1 errno=0 [ 224.229672][ T36] audit: type=1804 audit(1608024403.461:10): pid=10054 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/2/file0/bus" dev="loop4" ino=8 res=1 errno=0 09:26:44 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x1204, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffeffff, 0x9}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000004, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) 09:26:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8929, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:44 executing program 3: prctl$PR_SET_PDEATHSIG(0x25, 0x0) 09:26:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8907, 0x0) 09:26:44 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) 09:26:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, &(0x7f0000000440)=""/180, 0x36, 0xb4, 0x1}, 0x20) 09:26:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89a0, &(0x7f0000000000)={'syztnl2\x00', 0x0}) 09:26:44 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x51, 0x5f]}}, &(0x7f0000000100)=""/206, 0x28, 0xce, 0x1}, 0x20) 09:26:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000440)=""/180, 0x36, 0xb4, 0x1}, 0x20) [ 224.774411][ T21] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 09:26:44 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 224.968048][T10094] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 224.996178][ T36] audit: type=1804 audit(1608024404.291:11): pid=10094 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir990722048/syzkaller.wpyY6j/3/file0/bus" dev="loop4" ino=10 res=1 errno=0 09:26:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8902, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:44 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000200)) 09:26:44 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000480)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x5, 0x7, 0xa}}) 09:26:44 executing program 2: keyctl$join(0x17, 0x0) 09:26:44 executing program 1: prctl$PR_SET_PDEATHSIG(0x2, 0x748000) 09:26:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 09:26:44 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 225.347202][ T210] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 09:26:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8940, 0x0) 09:26:44 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:26:44 executing program 5: socketpair(0x22, 0x0, 0x2, &(0x7f0000000240)) 09:26:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x4}]}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) 09:26:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:45 executing program 1: prctl$PR_SET_PDEATHSIG(0x24, 0x400000000000029) 09:26:45 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) 09:26:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8915, 0x0) 09:26:45 executing program 1: ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x8001, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) 09:26:45 executing program 4: syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f00000009c0)={[], [{@subj_role={'subj_role'}}]}) 09:26:45 executing program 3: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x9, 0x200) 09:26:45 executing program 5: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') syz_mount_image$erofs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:26:45 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)) 09:26:45 executing program 2: r0 = epoll_create(0x2) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0x100000, 0x0, 0x0) 09:26:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8913, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:45 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0xc, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3e836cb5"}, 0x0, 0x0, @userptr}) [ 226.048544][T10159] erofs: Unknown parameter 'subj_role' 09:26:45 executing program 5: ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000040)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') 09:26:45 executing program 1: ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x8001, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) 09:26:45 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) [ 226.135474][T10159] erofs: Unknown parameter 'subj_role' 09:26:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x5f5e0ff, 0xa2}, 0x20) 09:26:45 executing program 1: syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) 09:26:45 executing program 4: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 09:26:45 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_io_uring_setup(0x4568, &(0x7f0000000040)={0x0, 0xfef5, 0x2a, 0x0, 0x0, 0x0, r0}, &(0x7f0000fef000/0xe000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 09:26:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:46 executing program 2: setreuid(0xee01, 0x0) keyctl$join(0x1, 0x0) 09:26:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/162, 0x0, 0xa2, 0x8}, 0x20) 09:26:46 executing program 5: prctl$PR_SET_PDEATHSIG(0x59616d61, 0x748000) 09:26:46 executing program 4: r0 = epoll_create(0x2) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}], 0x2, 0x100000, 0x0, 0x0) 09:26:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:46 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) 09:26:46 executing program 5: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0, 0x2}) 09:26:46 executing program 1: socketpair(0x22, 0x0, 0x3, &(0x7f0000000040)) 09:26:46 executing program 2: setreuid(0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) [ 227.105189][T10222] BPF:hdr_len not found [ 227.122101][T10222] BPF:hdr_len not found 09:26:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:26:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 09:26:46 executing program 5: keyctl$join(0x19, 0x0) 09:26:47 executing program 4: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x4008700e) 09:26:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:26:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x8}, 0x20) 09:26:47 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x989680}}, 0x0) 09:26:47 executing program 2: syz_io_uring_complete(0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x6800) 09:26:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/206, 0x42, 0xce, 0x1}, 0x20) 09:26:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:26:47 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8924, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0xe0000008}) 09:26:47 executing program 1: prctl$PR_SET_PDEATHSIG(0xf, 0x400000000000029) 09:26:47 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x5, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000200)) [ 227.977856][T10264] BPF:Unsupported version [ 228.003682][T10264] BPF:Unsupported version 09:26:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/162, 0x0, 0xa2, 0x1}, 0x20) 09:26:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x1}, 0x14}}, 0x0) 09:26:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'gretap0\x00', 0x0}) 09:26:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 09:26:47 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 09:26:47 executing program 5: socket$inet6_sctp(0xa, 0xe, 0x84) 09:26:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/162, 0x0, 0xa2, 0x1}, 0x20) 09:26:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5, 0x3}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000440)=""/180, 0x42, 0xb4, 0x1}, 0x20) 09:26:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x6}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000440)=""/180, 0x3c, 0xb4, 0x1}, 0x20) 09:26:47 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200000, 0x0) accept$phonet_pipe(r0, 0x0, 0x0) 09:26:47 executing program 4: keyctl$join(0xc, 0x0) 09:26:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8982, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x894c, 0x0) 09:26:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/162, 0x0, 0xa2, 0x1}, 0x20) 09:26:47 executing program 0: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000040)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') r0 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x4}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x48011}, 0x100) syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x20, 0x8, &(0x7f0000000900)=[{&(0x7f00000002c0)="65a850cbfc39de44a6d3b20007a705f44651c6341712b5978c285ad16cad202dd6a680c6a906aa6c635e6ce287eb106db60b3fc4b5e62ac509889b1f09ddaaddbb7b7e1cb5eae546fe0eb5b180e2bbdaef4a8918764093e6d470f4ea0ebe03c4d8896c3d6bcc3a54f3c7ff8f49fae574f4920ae20f77ba9288e0", 0x7a, 0xffff}, {&(0x7f0000000340)="e3b2f41742e4a15344cd6d3312ead7253737d6a75ae5c1d38fcfbb2f5ba6edbc9cc083531d79138b4b641b59ce5ccb78702244dbb47d57dacd73befe85c84139e09fca85bf41b4a8998c8fcf324aeb7347876c679ae4c5173cd536c1ffefe98b96c71ab2b1934d0c34dafc909c60bdeddf29d9b30dc04fd30e8b6bfdb5adf304721a9862a8f6761950aa28c31ef5357e9fa63e39c14d01a4c45b27c9f0790c25cda7417f7026f32f6067e793c86a56e5f9ec623a53fa3f0e995a8ef96f6b2536050b6ea0b87c0a41587b", 0xca, 0xfffffffffffffc00}, {&(0x7f0000000440)="5a7238f2b6b8ab3700a01f7ed3d95a8e38222a377cea79cae83b5a293f52e818facac49dfe91c1f4352746d3ab02ea45ce82f5a25179d43141aa47ba4fde1668515f56d060bc7a286c5710131b0371904df2e98bea17f74b78c0fe73e4aef837e67b050470beec3c0d37bbffadfc9db8af911ba0b2c7aa28d43e368998dc4a65697f4dfde1027a07efbd61e8a03ac0ff", 0x90, 0x1}, {&(0x7f0000000500)="d3266d8083ff8254c02c8e7b1eb58f4a1c458f2420e7beb610bd7b4903e3a3aaabd67e43d8b096500ced4393f230cbf6978a552a16cfeae773bf103ac1a59975a08f7cdd4bc78895d4506c2e7bb0f05512732cb391c97abd4a0ea4fac0cb1074927436c3cca01968f5d78ff920e8fe158ab188501ce1d635a8372e2438fa5ebea07d52665496e68ff11a607cfba4290aa6a18fbc21d246fc547c5937a725e9a12fab41670b89912cb04e571e14ab2e23b1edbc28646f39c35c676015075142", 0xbf, 0x1}, {&(0x7f00000005c0)="5c965764bee7d49aa91bbc23022d3bdfb0e94d2bad7b944e6ba36130a0419e0f25b730418f4c519a72f1f1f4d008193c8cf48d4a0ad292cb4e358df1c7e2981f76e21be5602bbc9462581a7a142a1c4483d5723a3f19c782d1e81978110794422b9a6b8e14551776a2a12f7418b724787b1b104da1eb2c7ebf9a28e275c9719d3c51825885277696db5a", 0x8a, 0x6}, {&(0x7f0000000680)="3a47679e796355ac81f173301a93bba32dca0a5d77084b370d2a40683a36e6387b11ec4da849ca10c2347fe707efc21f0ff7f538d2e8932127ae198a7734fbd766ff180e90dd638bbdd311f774b50e35804f4fbc68d101b3e3119bd0776c17f731e52c5898768fbb7a04b13ea1c6bbd3ca1ece9f53cbc0fc7979f43835b403e4eacf7a8ff663be137304f87d2b6c8dc7c9e318ef4b79251060d9887774eca0f96a85b236319dca6ea4339c3b8a58f852f446eca0db324f4577a2e402dafe9c9007300dcfec16d48cadd1db78870eca3dbabbed3f448a856f0df6503410b591e0e4", 0xe1, 0x43}, {&(0x7f0000000780)="6eaba14f00c3e0848f9a9ecd2ff9c78ae6435e69ac5e3cf1da854ace9f55af81e110fc06f567a167d5e3bc2ef2a0c9c6809851015171b3eb4653605bacf5e2e4a88340ebcc37446855803fd815c0a74c89aafdd7daa993cf0730fa778209c1b62bf6d63ebc91abb66c478941cdb99e3100c4893e30cb", 0x76, 0x5}, {&(0x7f0000000800)="764557485e9d188680ed097425798075a5452c8c015b839df07b014df2d84d2a7e9cf7cb5b8ccb9b92d60430f78b9a8dc9ba1493b49ffeb38a1c463d4f977063c73f0b1af082fd7ecdaab9dcd14addccee2092efc49ff992bbae5ca601a82c74c79a8f59c52b655b33e86beff4a386bfef49d0d408b367beb38ae66969d393f529d03e9692d21fdb481125d948fb4f7ad012bf4677c5dddbf4502a8f622d6a1b6486b951c9dc7ddf8e7921510642df31f8702a960b2c4189cad9dca6efaa3f00dab941d7882c942debdc41ff9c6ad7fe4e2557fc60a7b966e847920941acbe98af", 0xe1, 0x80000000}], 0x2004000, &(0x7f00000009c0)={[{@noacl='noacl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}, {@acl='acl'}, {@noacl='noacl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}], [{@subj_role={'subj_role'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>', 0xee01}}, {@obj_type={'obj_type', 0x3d, 'NLBL_CALIPSO\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '-@:'}}, {@dont_hash='dont_hash'}]}) 09:26:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000440)=""/180, 0x3f, 0xb4, 0x1}, 0x20) 09:26:48 executing program 4: socketpair(0x1d, 0x0, 0x7, &(0x7f0000000100)) 09:26:48 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:48 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:48 executing program 1: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000040)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x4}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x48011}, 0x100) syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x20, 0x8, &(0x7f0000000900)=[{&(0x7f00000002c0)="65a850cbfc39de44a6d3b20007a705f44651c6341712b5978c285ad16cad202dd6a680c6a906aa6c635e6ce287eb106db60b3fc4b5e62ac509889b1f09ddaaddbb7b7e1cb5eae546fe0eb5b180e2bbdaef4a8918764093e6d470f4ea0ebe03c4d8896c3d6bcc3a54f3c7ff8f49fae574f4920ae20f77ba9288e0", 0x7a, 0xffff}, {&(0x7f0000000340)="e3b2f41742e4a15344cd6d3312ead7253737d6a75ae5c1d38fcfbb2f5ba6edbc9cc083531d79138b4b641b59ce5ccb78702244dbb47d57dacd73befe85c84139e09fca85bf41b4a8998c8fcf324aeb7347876c679ae4c5173cd536c1ffefe98b96c71ab2b1934d0c34dafc909c60bdeddf29d9b30dc04fd30e8b6bfdb5adf304721a9862a8f6761950aa28c31ef5357e9fa63e39c14d01a4c45b27c9f0790c25cda7417f7026f32f6067e793c86a56e5f9ec623a53fa3f0e995a8ef96f6b2536050b6ea0b87c0a41587b", 0xca, 0xfffffffffffffc00}, {&(0x7f0000000440)="5a7238f2b6b8ab3700a01f7ed3d95a8e38222a377cea79cae83b5a293f52e818facac49dfe91c1f4352746d3ab02ea45ce82f5a25179d43141aa47ba4fde1668515f56d060bc7a286c5710131b0371904df2e98bea17f74b78c0fe73e4aef837e67b050470beec3c0d37bbffadfc9db8af911ba0b2c7aa28d43e368998dc4a65697f4dfde1027a07efbd61e8a03ac0ff", 0x90, 0x1}, {&(0x7f0000000500)="d3266d8083ff8254c02c8e7b1eb58f4a1c458f2420e7beb610bd7b4903e3a3aaabd67e43d8b096500ced4393f230cbf6978a552a16cfeae773bf103ac1a59975a08f7cdd4bc78895d4506c2e7bb0f05512732cb391c97abd4a0ea4fac0cb1074927436c3cca01968f5d78ff920e8fe158ab188501ce1d635a8372e2438fa5ebea07d52665496e68ff11a607cfba4290aa6a18fbc21d246fc547c5937a725e9a12fab41670b89912cb04e571e14ab2e23b1edbc28646f39c35c676015075142", 0xbf, 0x1}, {&(0x7f00000005c0)="5c965764bee7d49aa91bbc23022d3bdfb0e94d2bad7b944e6ba36130a0419e0f25b730418f4c519a72f1f1f4d008193c8cf48d4a0ad292cb4e358df1c7e2981f76e21be5602bbc9462581a7a142a1c4483d5723a3f19c782d1e81978110794422b9a6b8e14551776a2a12f7418b724787b1b104da1eb2c7ebf9a28e275c9719d3c51825885277696db5a", 0x8a, 0x6}, {&(0x7f0000000680)="3a47679e796355ac81f173301a93bba32dca0a5d77084b370d2a40683a36e6387b11ec4da849ca10c2347fe707efc21f0ff7f538d2e8932127ae198a7734fbd766ff180e90dd638bbdd311f774b50e35804f4fbc68d101b3e3119bd0776c17f731e52c5898768fbb7a04b13ea1c6bbd3ca1ece9f53cbc0fc7979f43835b403e4eacf7a8ff663be137304f87d2b6c8dc7c9e318ef4b79251060d9887774eca0f96a85b236319dca6ea4339c3b8a58f852f446eca0db324f4577a2e402dafe9c9007300dcfec16d48cadd1db78870eca3dbabbed3f448a856f0df6503410b591e0e4", 0xe1, 0x43}, {&(0x7f0000000780)="6eaba14f00c3e0848f9a9ecd2ff9c78ae6435e69ac5e3cf1da854ace9f55af81e110fc06f567a167d5e3bc2ef2a0c9c6809851015171b3eb4653605bacf5e2e4a88340ebcc37446855803fd815c0a74c89aafdd7daa993cf0730fa778209c1b62bf6d63ebc91abb66c478941cdb99e3100c4893e30cb", 0x76, 0x5}, {&(0x7f0000000800)="764557485e9d188680ed097425798075a5452c8c015b839df07b014df2d84d2a7e9cf7cb5b8ccb9b92d60430f78b9a8dc9ba1493b49ffeb38a1c463d4f977063c73f0b1af082fd7ecdaab9dcd14addccee2092efc49ff992bbae5ca601a82c74c79a8f59c52b655b33e86beff4a386bfef49d0d408b367beb38ae66969d393f529d03e9692d21fdb481125d948fb4f7ad012bf4677c5dddbf4502a8f622d6a1b6486b951c9dc7ddf8e7921510642df31f8702a960b2c4189cad9dca6efaa3f00dab941d7882c942debdc41ff9c6ad7fe4e2557fc60a7b966e847920941acbe98af", 0xe1, 0x80000000}], 0x2004000, &(0x7f00000009c0)={[{@noacl='noacl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}, {@acl='acl'}, {@noacl='noacl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}], [{@subj_role={'subj_role'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>', 0xee01}}, {@obj_type={'obj_type', 0x3d, 'NLBL_CALIPSO\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '-@:'}}, {@dont_hash='dont_hash'}]}) 09:26:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x80ffff}]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 09:26:48 executing program 4: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 228.743755][T10317] erofs: Unknown parameter 'fault_injection' 09:26:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8919, 0x0) [ 228.954679][T10339] erofs: Unknown parameter 'fault_injection' 09:26:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 09:26:48 executing program 0: prctl$PR_SET_PDEATHSIG(0xf, 0x400000) 09:26:48 executing program 5: syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4) 09:26:48 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x2]}, &(0x7f0000fef000/0xe000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 09:26:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x6, 0x3}}]}}, &(0x7f0000000040)=""/162, 0x32, 0xa2, 0x1}, 0x20) 09:26:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 09:26:48 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) syz_genetlink_get_family_id$nl80211(0x0) syz_mount_image$xfs(&(0x7f0000000b40)='xfs\x00', &(0x7f0000000b80)='./file0\x00', 0x0, 0x0, &(0x7f0000000cc0), 0x0, &(0x7f0000000d00)={[{@ikeep='ikeep'}]}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 09:26:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 09:26:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@struct={0x0, 0x2, 0x0, 0x4, 0x1, 0xad9, [{0x0, 0x5}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/206, 0x42, 0xce, 0x1}, 0x20) 09:26:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8934, 0x0) 09:26:48 executing program 5: keyctl$join(0x2, 0x0) 09:26:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:26:48 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200000, 0x0) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 09:26:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x6, 0x3}}]}}, &(0x7f0000000040)=""/162, 0x32, 0xa2, 0x1}, 0x20) 09:26:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001340)='/dev/sg#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) [ 229.373249][T10366] XFS: ikeep mount option is deprecated. 09:26:48 executing program 2: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x4024700a) 09:26:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000440)=""/180, 0x3a, 0xb4, 0x1}, 0x20) [ 229.475840][T10366] XFS (loop4): Invalid superblock magic number 09:26:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xa}]}, @enum]}}, &(0x7f0000000440)=""/180, 0x3a, 0xb4, 0x1}, 0x20) [ 229.649658][T10376] XFS: ikeep mount option is deprecated. 09:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8980, 0x0) 09:26:49 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000040)={'syztnl1\x00', 0x0}) 09:26:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:26:49 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_io_uring_setup(0x86, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r0, 0x0, 0x0}, 0x0) io_uring_enter(r3, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:26:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8903, 0x0) 09:26:49 executing program 0: syz_genetlink_get_family_id$netlbl_unlabel(0xffffffffffffffff) [ 229.738406][T10376] XFS (loop4): Invalid superblock magic number 09:26:49 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20) 09:26:49 executing program 2: syz_open_dev$sg(&(0x7f0000001340)='/dev/sg#\x00', 0x0, 0x44000) 09:26:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:26:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@array]}, {0x68}}, &(0x7f0000000040)=""/165, 0x32, 0xa5, 0x1}, 0x20) 09:26:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8904, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:49 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='io.max\x00', 0x2, 0x0) 09:26:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891c, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xa, 0x4}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x7}]}]}}, &(0x7f0000000440)=""/180, 0x4a, 0xb4, 0x1}, 0x20) 09:26:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2}, 0x20) 09:26:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8941, 0x0) 09:26:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8916, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891b, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:49 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x0) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4) 09:26:49 executing program 2: keyctl$join(0x17, &(0x7f0000000000)={'syz', 0x0}) 09:26:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2}, 0x20) 09:26:49 executing program 5: syz_io_uring_setup(0x1130, &(0x7f0000001100), &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x64f2, &(0x7f0000001200), &(0x7f0000000000/0x1000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000001280), &(0x7f00000012c0)) 09:26:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8953, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:26:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2}, 0x20) 09:26:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8948, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:50 executing program 4: syz_mount_image$erofs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:26:50 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 09:26:50 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x77359400}, {r0, r1+60000000}}, 0x0) 09:26:50 executing program 1: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000380)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1af1540"}, 0x0, 0x0, @planes=0x0}) 09:26:50 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202600, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 09:26:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x2}]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x8}, 0x20) 09:26:50 executing program 4: prctl$PR_SET_PDEATHSIG(0x25, 0x748000) 09:26:50 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_io_uring_setup(0x5c1c, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 09:26:50 executing program 2: keyctl$join(0x12, 0x0) 09:26:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 09:26:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f00000001c0)=""/162, 0x3e, 0xa2, 0x1}, 0x20) 09:26:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x4000}]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x8}, 0x20) 09:26:50 executing program 5: socketpair(0xa, 0x3, 0x87, &(0x7f0000000000)) [ 231.036180][T10520] BPF:[1] Invalid name_offset:2 09:26:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)) 09:26:50 executing program 0: syz_io_uring_setup(0x1130, &(0x7f0000001100), &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000001180), &(0x7f00000011c0)) [ 231.061737][T10520] BPF:[1] Invalid name_offset:2 [ 231.125498][T10528] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 09:26:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f00000009c0)={[{@acl='acl'}]}) [ 231.220749][T10537] BPF:[1] UNION (anon) 09:26:50 executing program 1: prctl$PR_SET_PDEATHSIG(0x22, 0x0) 09:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8937, &(0x7f00000000c0)={'tunl0\x00', 0x0}) [ 231.267201][T10537] BPF: [ 231.280129][T10537] BPF:meta_left:0 meta_needed:196608 [ 231.325036][T10537] BPF: [ 231.325036][T10537] 09:26:50 executing program 5: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 09:26:50 executing program 2: prctl$PR_SET_PDEATHSIG(0x24, 0x0) [ 231.364080][T10537] BPF:[1] UNION (anon) [ 231.378297][T10537] BPF: [ 231.388844][T10537] BPF:meta_left:0 meta_needed:196608 09:26:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x3}]}}, 0x0, 0x26}, 0x20) 09:26:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8940, &(0x7f00000000c0)={'erspan0\x00', 0x0}) [ 231.430373][T10537] BPF: [ 231.430373][T10537] 09:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8934, &(0x7f0000000000)={'syztnl2\x00', 0x0}) [ 231.472355][T10556] erofs: (device loop3): erofs_read_superblock: cannot find valid erofs superblock 09:26:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x6, 0x3}}, @func={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000040)=""/162, 0x3f, 0xa2, 0x1}, 0x20) 09:26:50 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000200)={0x2}) 09:26:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union, @union]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) [ 231.563419][T10556] erofs: (device loop3): erofs_read_superblock: cannot find valid erofs superblock 09:26:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:51 executing program 1: keyctl$join(0x16, 0x0) 09:26:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @dev}}}}) 09:26:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd}]}}, 0x0, 0x2a}, 0x20) 09:26:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x15, 0x2}, {0x68}}, &(0x7f00000001c0)=""/159, 0x1a, 0xa2}, 0x84) 09:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8931, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}, {0x68}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 09:26:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @dev}}}}) 09:26:51 executing program 1: openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5, &(0x7f0000000900)=[{&(0x7f00000002c0)="65a850cbfc39de44a6d3b20007a705f44651c6341712b5978c285ad16cad202dd6a680c6a906aa6c635e6ce287eb106db6", 0x31, 0xffff}, {&(0x7f0000000340)="e3b2f41742e4a15344cd6d3312ead7253737d6a75ae5c1d38fcfbb2f5ba6edbc9cc083531d79138b4b641b59ce5ccb78702244dbb47d57dacd73befe85c84139e09fca85bf41b4a8998c8fcf324aeb7347876c679ae4c5173cd536c1ffefe98b96c71ab2b1934d0c34dafc909c60bdeddf29d9b30dc04fd30e8b6bfdb5adf304721a9862a8f6761950aa28c31ef5357e9fa63e39c14d01a4c45b27c9f0790c25cda7417f7026f32f6067e793c86a56e5f9ec623a53fa3f0e995a8ef96f6b2536050b6ea0b87c0a", 0xc7, 0xfffffffffffffc00}, {&(0x7f0000000440)="5a7238f2b6b8ab3700a01f7ed3d95a8e38222a377cea79cae83b5a293f52e818facac49dfe91c1f4352746d3ab02ea45ce82f5a25179d43141aa47ba4fde16", 0x3f, 0x1}, {&(0x7f0000000500)="d3", 0x1}, {&(0x7f0000000800)='vE', 0x2, 0x80000000}], 0x0, &(0x7f00000009c0)={[{@noacl='noacl'}, {@fault_injection={'fault_injection'}}], [{@subj_role={'subj_role'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@permit_directio='permit_directio'}, {@obj_type={'obj_type', 0x3d, 'NLBL_CALIPSO\x00'}}, {@dont_hash='dont_hash'}]}) 09:26:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x1a}, 0x20) socketpair(0x1, 0x2, 0x0, &(0x7f0000000240)) 09:26:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[], 0x0, 0x1a}, 0x20) 09:26:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5411, &(0x7f00000000c0)={'erspan0\x00', 0x0}) [ 232.198516][T10608] erofs: Unknown parameter 'fault_injection' 09:26:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 09:26:51 executing program 0: prctl$PR_SET_PDEATHSIG(0x10, 0x400000000000029) 09:26:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5}, {0x5}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:26:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000440)=""/180, 0x2c, 0xb4, 0x1}, 0x20) [ 232.301987][T10615] erofs: Unknown parameter 'fault_injection' 09:26:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8917, &(0x7f0000000000)={'syztnl2\x00', 0x0}) 09:26:51 executing program 4: keyctl$join(0x1b, 0x0) 09:26:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891c, &(0x7f0000000000)={'syztnl2\x00', 0x0}) 09:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:51 executing program 1: keyctl$join(0x1c, 0x0) 09:26:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2a}, 0x20) 09:26:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000440)=""/180, 0x34, 0xb4, 0x1}, 0x20) 09:26:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xd}]}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) [ 232.677281][T10643] erspan0: mtu less than device minimum 09:26:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@enum={0x6, 0x2, 0x0, 0x6, 0x4, [{0x6}, {0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000440)=""/180, 0x3c, 0xb4, 0x1}, 0x20) 09:26:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000b40)='xfs\x00', &(0x7f0000000b80)='./file0\x00', 0x0, 0x0, &(0x7f0000000cc0), 0x0, &(0x7f0000000d00)={[{@ikeep='ikeep'}]}) 09:26:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x8}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 09:26:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x890b, 0x0) 09:26:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x2}]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:52 executing program 4: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 09:26:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89a0, 0x0) 09:26:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:52 executing program 1: prctl$PR_SET_PDEATHSIG(0x3a, 0x400000000000029) 09:26:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:52 executing program 0: prctl$PR_SET_PDEATHSIG(0x21, 0x400000000000029) [ 232.970483][T10661] XFS: ikeep mount option is deprecated. 09:26:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xad9, [{0x0, 0x5}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:26:52 executing program 2: bpf$BPF_BTF_LOAD(0x20000245, 0x0, 0x0) [ 233.097306][T10661] XFS (loop5): Invalid superblock magic number [ 233.205415][T10661] XFS: ikeep mount option is deprecated. 09:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:52 executing program 3: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, &(0x7f0000000280)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x480800, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_io_uring_complete(0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, &(0x7f0000000380)) 09:26:52 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "69b30313"}, 0x0, 0x0, @userptr}) 09:26:52 executing program 4: syz_genetlink_get_family_id$netlbl_calipso(0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00') 09:26:52 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/dsp1\x00', 0x6841, 0x0) 09:26:52 executing program 2: syz_io_uring_setup(0x1093, &(0x7f00000000c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 09:26:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8935, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa}, {}]}]}}, &(0x7f0000000440)=""/180, 0x36, 0xb4, 0x1}, 0x20) 09:26:52 executing program 1: prctl$PR_SET_PDEATHSIG(0x15, 0x0) 09:26:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) close(r0) dup2(r0, r0) 09:26:52 executing program 2: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f00003fd000/0xc00000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000180)) 09:26:52 executing program 5: openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) 09:26:52 executing program 4: unshare(0x2a000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) eventfd(0x0) 09:26:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8947, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8913, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:53 executing program 3: prctl$PR_SET_PDEATHSIG(0xf, 0x807400) 09:26:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000013c0)={0x1, &(0x7f0000001380)=[{0x20}]}) 09:26:53 executing program 5: getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, 0x0, 0x0) 09:26:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:53 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000002ac0)='/dev/snd/controlC#\x00', 0x8001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, 0x0) 09:26:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x4020940d, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8906, 0x0) 09:26:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26}, 0x20) 09:26:53 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cachefiles\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cachefiles\x00', 0x20881, 0x0) 09:26:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x12000000}]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000004c0)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x10016, 0x0, 0x0}) 09:26:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x51]}}, &(0x7f0000000100)=""/206, 0x27, 0xce, 0x1}, 0x20) 09:26:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:53 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200000, 0x0) epoll_wait(r0, &(0x7f00000001c0)=[{}], 0x1, 0x0) 09:26:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 09:26:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8992, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:53 executing program 4: r0 = getpid() r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r2, &(0x7f0000000240)={r1}) 09:26:53 executing program 3: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1cdc) syz_open_dev$rtc(0x0, 0x0, 0x0) 09:26:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:53 executing program 2: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:26:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:53 executing program 0: keyctl$join(0x6, 0x0) 09:26:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891a, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:53 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x800a, 0x0) 09:26:53 executing program 2: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x80247008) 09:26:53 executing program 1: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000033c0)) 09:26:53 executing program 3: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGREPORTINFO(r0, 0x400c4808, &(0x7f0000000a00)) 09:26:53 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, 0x0) 09:26:54 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000cc0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) 09:26:54 executing program 5: syz_io_uring_setup(0x30, &(0x7f00000002c0), &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000340), 0x0) 09:26:54 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x600001, 0x0) connect$phonet_pipe(r0, 0x0, 0x0) 09:26:54 executing program 1: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000033c0)) 09:26:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8911, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:54 executing program 1: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000033c0)) 09:26:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x4, 0x5}]}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) 09:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 09:26:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 09:26:54 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89a3, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:54 executing program 1: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:54 executing program 0: keyctl$join(0x19, &(0x7f0000000000)={'syz', 0x0}) 09:26:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89a1, 0x0) 09:26:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:54 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:54 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:54 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) 09:26:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:26:54 executing program 1: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:54 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x0) 09:26:54 executing program 0: prctl$PR_SET_PDEATHSIG(0x28, 0x0) 09:26:54 executing program 3: socketpair(0xa, 0x2, 0x7, &(0x7f0000000040)) 09:26:54 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:54 executing program 1: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000033c0)) 09:26:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891c, 0x0) 09:26:55 executing program 0: prctl$PR_SET_PDEATHSIG(0x10, 0x905400) 09:26:55 executing program 1: syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000033c0)) 09:26:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8915, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:26:55 executing program 5: syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:55 executing program 0: keyctl$join(0xb, 0x0) 09:26:55 executing program 3: socketpair(0xa, 0x3, 0x2, &(0x7f0000000000)) 09:26:55 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:26:55 executing program 1: syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000033c0)) 09:26:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @enum]}}, &(0x7f0000000440)=""/180, 0x4a, 0xb4, 0x1}, 0x20) 09:26:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f00000009c0)) 09:26:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:55 executing program 5: syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:55 executing program 1: syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000033c0)) 09:26:55 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:26:55 executing program 5: syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:55 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7848a3de"}, 0x0, 0x0, @fd}) 09:26:55 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x24, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x22, 0x1, {[@main]}}, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0x4018480c, &(0x7f0000000a00)={0x1}) [ 236.210541][T10936] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 09:26:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000440)=""/180, 0x3b, 0xb4, 0x1}, 0x20) 09:26:55 executing program 0: timer_create(0x3, 0x0, &(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000100)) 09:26:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) [ 236.313866][T10936] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 09:26:55 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:55 executing program 3: prctl$PR_SET_PDEATHSIG(0x18, 0x400000000000029) 09:26:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) 09:26:55 executing program 4: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x1, 0x0) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000040)) 09:26:55 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:26:56 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:56 executing program 3: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x4008700c) 09:26:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000003380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) [ 236.759506][ T3148] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 237.130450][ T3148] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 237.149650][ T3148] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 237.168378][ T3148] usb 3-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 237.186523][ T3148] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 237.208829][ T3148] usb 3-1: config 0 descriptor?? [ 237.263852][ T3148] usbhid 3-1:0.0: can't add hid device: -22 [ 237.270491][ T3148] usbhid: probe of 3-1:0.0 failed with error -22 09:26:58 executing program 2: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) 09:26:58 executing program 0: setreuid(0xee00, 0xee00) keyctl$join(0x1, 0x0) 09:26:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891a, 0x0) 09:26:58 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:58 executing program 3: r0 = epoll_create(0x5) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x5) 09:26:58 executing program 4: prctl$PR_SET_PDEATHSIG(0x2f, 0x0) 09:26:58 executing program 1: keyctl$join(0x7, 0x0) [ 239.438808][ T7] usb 3-1: USB disconnect, device number 2 09:26:58 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x8001, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) 09:26:58 executing program 5: r0 = syz_io_uring_setup(0x2cd6, 0x0, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8994, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:58 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, 0x0) 09:26:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8983, 0x0) 09:26:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891f, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000cc0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) 09:26:59 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000003c0)={0x24, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x22, 0x1, {[@main=@item_012={0x0, 0x0, 0x8}]}}, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0x400c4807, &(0x7f0000000a00)={0x1}) 09:26:59 executing program 5: r0 = syz_io_uring_setup(0x2cd6, 0x0, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:59 executing program 3: getgroups(0x1f, &(0x7f0000000000)) 09:26:59 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50}, 0xffffff9d) unlink(&(0x7f0000000080)='./file0\x00') 09:26:59 executing program 1: r0 = syz_io_uring_setup(0x1efc, &(0x7f0000000140), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 09:26:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x26, 0xa2, 0x1}, 0x20) 09:26:59 executing program 3: prctl$PR_SET_PDEATHSIG(0x29, 0x400000000000029) 09:26:59 executing program 5: r0 = syz_io_uring_setup(0x2cd6, 0x0, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:26:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, 0x0) 09:26:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x894a, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 09:26:59 executing program 3: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7004) 09:26:59 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) [ 240.189569][ T7] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 240.559803][ T7] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 240.579405][ T7] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 240.589172][ T7] usb 1-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 240.641501][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 240.670142][ T7] usb 1-1: config 0 descriptor?? [ 241.230917][ T7] usbhid 1-1:0.0: can't add hid device: -71 [ 241.237672][ T7] usbhid: probe of 1-1:0.0 failed with error -71 [ 241.254254][ T7] usb 1-1: USB disconnect, device number 2 [ 241.919353][ T2991] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 242.309815][ T2991] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 242.320850][ T2991] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 242.332352][ T2991] usb 1-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 242.342299][ T2991] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 242.354518][ T2991] usb 1-1: config 0 descriptor?? 09:27:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x25}]}) 09:27:01 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:27:01 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:27:01 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000440)=""/180, 0x26, 0xb4, 0x1}, 0x20) 09:27:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 09:27:02 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) io_uring_setup(0x19b7, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 09:27:02 executing program 3: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0xc9, &(0x7f00000005c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000640)) 09:27:02 executing program 0: keyctl$join(0x1d, 0x0) 09:27:02 executing program 2: socketpair(0x25, 0x1, 0xc996, &(0x7f0000000080)) 09:27:02 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:02 executing program 4: ustat(0x6, &(0x7f0000000000)) [ 242.699534][ T2991] usbhid 1-1:0.0: can't add hid device: -71 [ 242.706966][ T2991] usbhid: probe of 1-1:0.0 failed with error -71 [ 242.771173][ T2991] usb 1-1: USB disconnect, device number 3 09:27:02 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:02 executing program 3: syz_io_uring_setup(0x0, &(0x7f0000000040), &(0x7f0000fef000/0xe000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)=0x0) r1 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x1, 0x13, r1, 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000180)=@IORING_OP_CLOSE, 0x0) 09:27:02 executing program 0: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) 09:27:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x18, 0xa2, 0x1}, 0x20) 09:27:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 09:27:02 executing program 2: syz_io_uring_setup(0x30, &(0x7f00000002c0)={0x0, 0xa5f9}, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 09:27:02 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:02 executing program 3: prctl$PR_SET_PDEATHSIG(0x34, 0x400000000000029) 09:27:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xc, 0x3}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000440)=""/180, 0x58, 0xb4, 0x1}, 0x20) 09:27:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 09:27:02 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x881, 0x0) 09:27:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/162, 0x18, 0xa2, 0x8}, 0x20) 09:27:02 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:27:02 executing program 3: keyctl$join(0x10, 0x0) 09:27:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5, 0x2}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:27:02 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x2b, 0x42, 0x80000000}, {0x6, 0x7, 0x4, 0x3}]}) 09:27:02 executing program 0: prctl$PR_SET_PDEATHSIG(0x35, 0x400000000000029) 09:27:02 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:02 executing program 2: keyctl$join(0x10, &(0x7f0000000000)={'syz', 0x0}) [ 243.419985][T11211] BPF:No data [ 243.438833][T11211] BPF:No data 09:27:02 executing program 3: keyctl$join(0x1a, 0x0) 09:27:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, 0x0) 09:27:02 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x0, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:03 executing program 0: syz_mount_image$jffs2(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40020, 0x0) 09:27:03 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x8}}) 09:27:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 09:27:03 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0) 09:27:03 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x0, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) [ 243.719996][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 243.720007][ T36] audit: type=1326 audit(1608024423.012:13): auid=0 uid=0 gid=0 ses=4 subj=_ pid=11219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:03 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x40247007) 09:27:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = semget$private(0x0, 0x4, 0x2) semctl$GETVAL(r0, 0x6, 0xc, &(0x7f0000000040)=""/138) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(r1, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) dup(0xffffffffffffffff) 09:27:03 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x800, 0x4) recvmmsg(r2, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @empty}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 09:27:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000000)={'syztnl2\x00', 0x0}) 09:27:03 executing program 2: sysfs$1(0x1, &(0x7f0000002480)='--#v$f\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002780), 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x5) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) syz_open_procfs(r1, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002600)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=ANY=[], 0xe8, 0x60}], 0x1, 0x20000814) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x4012}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_yield() r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r2, r2) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000000000)='R\trust\xe3cusgrVex:De', r2) 09:27:03 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x0, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) [ 244.388782][ T36] audit: type=1326 audit(1608024423.682:14): auid=0 uid=0 gid=0 ses=4 subj=_ pid=11219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:03 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4280, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_io_uring_complete(0x0) timer_getoverrun(0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000080)=0x4) 09:27:03 executing program 5: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, 0x0, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:03 executing program 4: prctl$PR_SET_PDEATHSIG(0x1d, 0x0) 09:27:04 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000000)) 09:27:04 executing program 4: keyctl$join(0x16, &(0x7f0000000000)={'syz', 0x0}) 09:27:04 executing program 2: keyctl$join(0x15, 0x0) 09:27:04 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x8001, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) 09:27:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) [ 244.779401][ T7] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 244.850565][T11282] syz-executor.0 (11282) used greatest stack depth: 23864 bytes left [ 245.219496][ T7] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 245.232383][ T7] usb 4-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 245.242099][ T7] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 245.252675][ T7] usb 4-1: config 0 descriptor?? [ 245.301805][ T7] usbhid 4-1:0.0: couldn't find an input interrupt endpoint [ 245.663529][ T7] usb 4-1: USB disconnect, device number 2 [ 246.429344][ T2991] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 246.849580][ T2991] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 246.862763][ T2991] usb 4-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 246.873238][ T2991] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 246.889821][ T2991] usb 4-1: config 0 descriptor?? [ 246.932739][ T2991] usbhid 4-1:0.0: couldn't find an input interrupt endpoint 09:27:06 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x800, 0x4) recvmmsg(r2, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @empty}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 09:27:06 executing program 4: keyctl$join(0x1c, &(0x7f0000000000)={'syz', 0x0}) 09:27:06 executing program 5: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, 0x0, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:06 executing program 2: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:27:06 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x8008700b) 09:27:06 executing program 0: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0xa, 0x0, &(0x7f0000000100)=0x94) mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) 09:27:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) [ 247.134485][ T7] usb 4-1: USB disconnect, device number 3 09:27:06 executing program 5: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, 0x0, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 09:27:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000000)={'gretap0\x00', 0x0}) 09:27:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8918, 0x0) 09:27:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x5}]}}, 0x0, 0x2a}, 0x20) [ 247.421516][ T36] audit: type=1326 audit(1608024426.722:15): auid=0 uid=0 gid=0 ses=4 subj=_ pid=11379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 247.604048][ T7] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 247.969458][ T7] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 247.982458][ T7] usb 4-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 247.991679][ T7] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 248.005510][ T7] usb 4-1: config 0 descriptor?? [ 248.052427][ T7] usbhid 4-1:0.0: couldn't find an input interrupt endpoint [ 248.179130][ T36] audit: type=1326 audit(1608024427.472:16): auid=0 uid=0 gid=0 ses=4 subj=_ pid=11379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 248.448022][ T9934] usb 4-1: USB disconnect, device number 4 09:27:08 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x800, 0x4) recvmmsg(r2, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @empty}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 09:27:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8924, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:27:08 executing program 4: r0 = epoll_create(0x2) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x800ffffd, 0x0, 0x0) 09:27:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:08 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:08 executing program 0: prctl$PR_SET_PDEATHSIG(0xf, 0x751000) 09:27:08 executing program 1: keyctl$join(0xd, 0x0) 09:27:08 executing program 0: pause() syz_io_uring_setup(0x4266, &(0x7f00000000c0), &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 09:27:08 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:08 executing program 1: bpf$MAP_CREATE(0x11, 0x0, 0x0) 09:27:08 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 249.399408][ T2991] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 249.784662][ T2991] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 249.797625][ T2991] usb 4-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 249.807497][ T2991] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 249.819902][ T2991] usb 4-1: config 0 descriptor?? [ 249.861992][ T2991] usbhid 4-1:0.0: couldn't find an input interrupt endpoint [ 250.282556][ T2991] usb 4-1: USB disconnect, device number 5 09:27:10 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x800, 0x4) recvmmsg(r2, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @empty}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 09:27:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:10 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:27:10 executing program 5: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 09:27:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x61]}}, &(0x7f0000000440)=""/180, 0x44, 0xb4, 0x1}, 0x20) 09:27:10 executing program 1: syz_mount_image$erofs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f00000009c0)={[], [{@permit_directio='permit_directio'}]}) 09:27:10 executing program 5: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) [ 251.263524][ T2991] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 251.659507][ T2991] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 251.673405][ T2991] usb 4-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 251.682628][ T2991] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 251.702121][ T2991] usb 4-1: config 0 descriptor?? [ 251.741873][ T2991] usbhid 4-1:0.0: couldn't find an input interrupt endpoint [ 252.127873][ T9653] usb 4-1: USB disconnect, device number 6 09:27:11 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000000)) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f00000000c0)=0x1) 09:27:11 executing program 5: syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 09:27:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:11 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0xf7, 0x2, 0x7, 0x1, 0x81, 0x5, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0x81, 0x4, 0x77}}}}}]}}]}}, &(0x7f00000002c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x7, 0x1, 0x9, 0x20, 0x80}, 0x26, &(0x7f0000000080)={0x5, 0xf, 0x26, 0x3, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x0, 0x2, 0x4}, @ssp_cap={0x14, 0x10, 0xa, 0x8, 0x2, 0x2, 0xf000, 0x1, [0xf, 0xffc000]}, @ptm_cap={0x3}]}, 0x4, [{0xfc, &(0x7f00000000c0)=@string={0xfc, 0x3, "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"}}, {0x17, &(0x7f00000001c0)=@string={0x17, 0x3, "75d19668a54bd080bca136fe5a5c36657e0f8f3be9"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x409}}, {0x61, &(0x7f0000000240)=@string={0x61, 0x3, "dbf7a25e513865d3fb8bfc51ffc7a3f571dc9a96112dcc8c7c70284796bf8ea3a70335adf3b02e9fa87d56ec91929a697b457b2686fe5ca0c5d699f2505d7a7042fb010fd60967cdd06238edd205e157574fb473063a00f1a5e45f802c9899"}}]}) 09:27:11 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x50}}, 0x0) 09:27:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:27:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:27:12 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000000340)) [ 252.737912][T11570] IPVS: ftp: loaded support on port[0] = 21 09:27:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = dup2(r1, r1) r3 = accept(r0, 0x0, 0x0) dup2(r2, r3) 09:27:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:27:12 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000000340)) [ 252.979722][ T9934] usb 2-1: new high-speed USB device number 2 using dummy_hcd 09:27:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000100)=""/206, 0x0, 0xce, 0x1}, 0x20) 09:27:12 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:12 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000000340)) 09:27:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000100)=""/206, 0x0, 0xce, 0x1}, 0x20) [ 253.225442][ T9934] usb 2-1: Using ep0 maxpacket: 32 [ 253.350009][ T9934] usb 2-1: config 1 interface 0 altsetting 247 bulk endpoint 0x1 has invalid maxpacket 16 [ 253.388355][ T9934] usb 2-1: config 1 interface 0 altsetting 247 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 253.478343][ T9934] usb 2-1: config 1 interface 0 has no altsetting 0 [ 253.526781][T11570] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 253.689569][ T9934] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 253.706648][ T9934] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 253.726073][ T9934] usb 2-1: Product: Љ [ 253.736239][ T9934] usb 2-1: Manufacturer: 텵梖䮥胐ꆼ︶屚收ཾ㮏 [ 253.753024][ T9934] usb 2-1: SerialNumber: 庢㡑퍥读凼쟿隚ⴑ賌灼䜨뾖ꎎΧ괵냳鼮綨銑榚䕻♻ﺆꁜ훅嵐灺﭂༁৖쵧拐ג埡佗玴㨆聟頬 [ 253.810156][T11572] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 254.073191][ T9934] usb 2-1: USB disconnect, device number 2 [ 254.809464][ T9934] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 255.079904][ T9934] usb 2-1: Using ep0 maxpacket: 32 [ 255.219523][ T9934] usb 2-1: config 1 interface 0 altsetting 247 bulk endpoint 0x1 has invalid maxpacket 16 [ 255.229545][ T9934] usb 2-1: config 1 interface 0 altsetting 247 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 255.244696][ T9934] usb 2-1: config 1 interface 0 has no altsetting 0 [ 255.439894][ T9934] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 255.448965][ T9934] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 255.458628][ T9934] usb 2-1: Product: Љ [ 255.463558][ T9934] usb 2-1: Manufacturer: 텵梖䮥胐ꆼ︶屚收ཾ㮏 [ 255.471675][ T9934] usb 2-1: SerialNumber: 庢㡑퍥读凼쟿隚ⴑ賌灼䜨뾖ꎎΧ괵냳鼮綨銑榚䕻♻ﺆꁜ훅嵐灺﭂༁৖쵧拐ג埡佗玴㨆聟頬 [ 255.520376][T11572] raw-gadget gadget: fail, usb_ep_enable returned -22 09:27:14 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, 0x0, 0x0, 0x0) 09:27:14 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), 0x0) 09:27:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000100)=""/206, 0x0, 0xce, 0x1}, 0x20) 09:27:14 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:14 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x50}}, 0x0) 09:27:14 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x50}}, 0x0) 09:27:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/206, 0x1a, 0xce, 0x1}, 0x20) 09:27:15 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), 0x0) [ 255.713172][ T9934] usb 2-1: USB disconnect, device number 3 [ 255.803120][T11685] IPVS: ftp: loaded support on port[0] = 21 [ 255.812213][T11686] IPVS: ftp: loaded support on port[0] = 21 09:27:15 executing program 1: select(0x40, &(0x7f0000000040)={0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0xea60}) 09:27:15 executing program 5: r0 = syz_io_uring_setup(0x2cd6, &(0x7f0000000080), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x43a2, &(0x7f0000000280)={0x0, 0x0, 0x33, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300), 0x0) 09:27:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/206, 0x1a, 0xce, 0x1}, 0x20) 09:27:15 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) r2 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/206, 0x1a, 0xce, 0x1}, 0x20) 09:27:15 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) geteuid() 09:27:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) [ 256.776959][T11685] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 256.838880][T11686] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 09:27:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000002c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 09:27:16 executing program 1: prctl$PR_SET_MM_MAP(0x34, 0xe, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0}, 0x68) 09:27:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:16 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000280)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x88d1}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0xa10000, 0x4f6, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:16 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:16 executing program 3: socket$inet_sctp(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 09:27:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a5ee821e7803a3eb00314264"], 0xa, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x2, 0x404441) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, 0xc) 09:27:16 executing program 4: syz_usb_connect(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x55, 0xd5, 0xa9, 0x0, [], [{{0x9, 0x5, 0xb, 0x3, 0x0, 0x6, 0x0, 0x0, [@generic={0x2}]}}, {{0x9, 0x5, 0xa, 0x0, 0x3ff, 0x0, 0x0, 0x0, [@uac_iso={0x7}]}}]}}]}}]}}, 0x0) 09:27:16 executing program 5: syz_open_dev$sndctrl(&(0x7f00000002c0)='/dev/snd/controlC#\x00', 0x7fff, 0x280) 09:27:16 executing program 3: socket$inet_sctp(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 09:27:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:27:16 executing program 5: socket$inet_sctp(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 09:27:16 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:27:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a5ee821e7803a3eb00314264"], 0xa, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x2, 0x404441) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, 0xc) 09:27:17 executing program 3: socket$inet_sctp(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 09:27:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) [ 257.700883][ T9653] usb 5-1: new high-speed USB device number 2 using dummy_hcd 09:27:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) fstat(r0, &(0x7f0000000180)) 09:27:17 executing program 1: socketpair(0x2, 0xa, 0x6c, &(0x7f0000000080)) [ 257.939495][ T9653] usb 5-1: Using ep0 maxpacket: 32 [ 258.059937][ T9653] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 258.085952][ T9653] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid maxpacket 1023, setting to 64 [ 258.117019][T11864] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 258.299855][ T9653] usb 5-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 258.317686][ T9653] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 258.337944][ T9653] usb 5-1: Product: syz [ 258.349564][ T9653] usb 5-1: Manufacturer: syz [ 258.354671][ T9653] usb 5-1: SerialNumber: syz [ 258.380561][ T9653] usb 5-1: config 0 descriptor?? [ 258.420975][ T9653] ftdi_sio 5-1:0.0: FTDI USB Serial Device converter detected [ 258.441555][ T9653] usb 5-1: Detected FT-X [ 258.446053][ T9653] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 11 [ 258.637897][ T9653] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 258.669848][ T9653] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 258.689946][ T9653] ftdi_sio 5-1:0.0: GPIO initialisation failed: -71 [ 258.710503][ T9653] usb 5-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 258.746570][ T9653] usb 5-1: USB disconnect, device number 2 [ 258.780064][ T9653] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 258.800764][ T9653] ftdi_sio 5-1:0.0: device disconnected [ 259.402423][ T17] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 259.649514][ T17] usb 5-1: Using ep0 maxpacket: 32 [ 259.769794][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 259.786384][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid maxpacket 1023, setting to 64 [ 259.949997][ T17] usb 5-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 259.959165][ T17] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 259.968920][ T17] usb 5-1: Product: syz [ 259.974201][ T17] usb 5-1: Manufacturer: syz [ 259.978802][ T17] usb 5-1: SerialNumber: syz [ 259.993440][ T17] usb 5-1: config 0 descriptor?? [ 260.030922][ T17] ftdi_sio 5-1:0.0: FTDI USB Serial Device converter detected [ 260.039152][ T17] usb 5-1: Detected FT-X [ 260.054289][ T17] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 11 09:27:19 executing program 4: syz_usb_connect(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x55, 0xd5, 0xa9, 0x0, [], [{{0x9, 0x5, 0xb, 0x3, 0x0, 0x6, 0x0, 0x0, [@generic={0x2}]}}, {{0x9, 0x5, 0xa, 0x0, 0x3ff, 0x0, 0x0, 0x0, [@uac_iso={0x7}]}}]}}]}}]}}, 0x0) 09:27:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:19 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:19 executing program 3: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x101040) 09:27:19 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x80800) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 09:27:19 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) [ 260.249585][ T17] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 260.270388][ T17] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 260.295973][ T17] ftdi_sio 5-1:0.0: GPIO initialisation failed: -71 09:27:19 executing program 5: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, 0x0) [ 260.354050][ T17] usb 5-1: FTDI USB Serial Device converter now attached to ttyUSB0 09:27:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:19 executing program 3: socketpair(0x2, 0x0, 0x0, &(0x7f0000000080)) 09:27:19 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) [ 260.455221][ T17] usb 5-1: USB disconnect, device number 3 [ 260.529131][ T17] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 260.562228][ T17] ftdi_sio 5-1:0.0: device disconnected 09:27:20 executing program 5: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, 0x0) 09:27:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) [ 260.959557][ T17] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 261.209585][ T17] usb 5-1: Using ep0 maxpacket: 32 [ 261.329617][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 261.343975][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid maxpacket 1023, setting to 64 [ 261.520120][ T17] usb 5-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 261.544591][ T17] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 261.576583][ T17] usb 5-1: Product: syz [ 261.596818][ T17] usb 5-1: Manufacturer: syz [ 261.609779][ T17] usb 5-1: SerialNumber: syz [ 261.648243][ T17] usb 5-1: config 0 descriptor?? [ 261.690989][ T17] ftdi_sio 5-1:0.0: FTDI USB Serial Device converter detected [ 261.699345][ T17] usb 5-1: Detected FT-X [ 261.720108][ T17] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 11 [ 261.919711][ T17] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 261.949678][ T17] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 261.979630][ T17] ftdi_sio 5-1:0.0: GPIO initialisation failed: -71 [ 261.988955][ T17] usb 5-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 262.010865][ T17] usb 5-1: USB disconnect, device number 4 [ 262.052160][ T17] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 262.081160][ T17] ftdi_sio 5-1:0.0: device disconnected 09:27:21 executing program 1: bpf$MAP_CREATE(0x11, &(0x7f0000000040), 0x40) 09:27:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:21 executing program 5: bpf$MAP_CREATE(0x14, 0x0, 0x0) 09:27:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:27:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) 09:27:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@private1, @private2, @local, 0x0, 0x2, 0x6}) 09:27:21 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a919b8d1"}, 0x0, 0x0, @fd}) 09:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="eb970e6d6c967e354f86f21572b457e04c5a1d28f41ee1e4c127bd8ae16e44b919cc55a6d5cb2d43bd", @ANYBLOB="4ae8bca89f0003b73c020000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0xc090) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x2, 0x404441) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x3, 0x5) 09:27:21 executing program 3: socketpair(0x2, 0x3, 0xf3, &(0x7f0000000080)) 09:27:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:27:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) 09:27:22 executing program 1: prctl$PR_SET_MM_MAP(0x1d, 0xe, 0x0, 0x0) 09:27:22 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1380402, &(0x7f0000002100)=ANY=[]) 09:27:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$nullb(0xffffffffffffff9c, 0x0, 0x400081, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0xf4, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4044840}, 0x4880) syz_open_dev$vcsn(0x0, 0x64, 0x800) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, &(0x7f0000000280)) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f0000000140)=ANY=[@ANYBLOB="8e87180137cf7b210b4cf3288ab6e900a44c385c1e07aedfe389d27ee2cc05a7c5097e54cb9ffed8813f6cf27a394589c8493f4f958cadf7cec2a866f25cc071e87b5ec30169f4029f188c7f9f8fb9815a5bf5c2269227dde4c2a705ec4dae324c114382fdec57c9a768be8a0407fb7fe8d9addf225a81ddda50812489822de718077f2460784ad3e030"]) open(&(0x7f0000000040)='./bus\x00', 0x20040, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) ftruncate(r2, 0x200002) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 09:27:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x32, 0xce, 0x1}, 0x20) 09:27:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="eb970e6d6c967e354f86f21572b457e04c5a1d28f41ee1e4c127bd8ae16e44b919cc55a6d5cb2d43bd", @ANYBLOB="4ae8bca89f0003b73c020000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0xc090) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x2, 0x404441) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x3, 0x5) 09:27:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="eb970e6d6c967e354f86f21572b457e04c5a1d28f41ee1e4c127bd8ae16e44b919cc55a6d5cb2d43bd", @ANYBLOB="4ae8bca89f0003b73c020000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0xc090) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x2, 0x404441) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x3, 0x5) 09:27:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x196, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0xc090) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x404441) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, 0xc) 09:27:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x0, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:22 executing program 1: set_mempolicy(0x1, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 09:27:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x196, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0xc090) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x404441) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, 0xc) 09:27:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="eb970e6d6c967e354f86f21572b457e04c5a1d28f41ee1e4c127bd8ae16e44b919cc55a6d5cb2d43bd", @ANYBLOB="4ae8bca89f0003b73c020000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0xc090) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x2, 0x404441) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x3, 0x5) [ 263.368041][ T36] audit: type=1804 audit(1608024442.661:17): pid=12049 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir577761275/syzkaller.wKYaQ2/85/bus" dev="sda1" ino=16057 res=1 errno=0 09:27:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x0, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:23 executing program 1: select(0x40, &(0x7f0000000040)={0x3}, &(0x7f0000000080)={0x5}, 0x0, &(0x7f0000000100)={0x0, 0xea60}) [ 263.583750][ T36] audit: type=1804 audit(1608024442.881:18): pid=12053 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir577761275/syzkaller.wKYaQ2/85/bus" dev="sda1" ino=16057 res=1 errno=0 [ 263.638815][ T36] audit: type=1800 audit(1608024442.931:19): pid=12049 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16057 res=0 errno=0 09:27:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$nullb(0xffffffffffffff9c, 0x0, 0x400081, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0xf4, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4044840}, 0x4880) syz_open_dev$vcsn(0x0, 0x64, 0x800) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, &(0x7f0000000280)) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f0000000140)=ANY=[@ANYBLOB="8e87180137cf7b210b4cf3288ab6e900a44c385c1e07aedfe389d27ee2cc05a7c5097e54cb9ffed8813f6cf27a394589c8493f4f958cadf7cec2a866f25cc071e87b5ec30169f4029f188c7f9f8fb9815a5bf5c2269227dde4c2a705ec4dae324c114382fdec57c9a768be8a0407fb7fe8d9addf225a81ddda50812489822de718077f2460784ad3e030"]) open(&(0x7f0000000040)='./bus\x00', 0x20040, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) ftruncate(r2, 0x200002) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 09:27:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x0, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:23 executing program 5: bpf$MAP_CREATE(0x5, 0x0, 0x0) 09:27:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x920, 0x1}, 0x40) [ 263.767311][ T36] audit: type=1800 audit(1608024442.931:20): pid=12053 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16057 res=0 errno=0 09:27:23 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) r2 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0xa10000, 0x4f6, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0xc) 09:27:23 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x9}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9}]}, 0x24}}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x4f6, 0x8, 0xffffffffffffffff, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) 09:27:23 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0x10) 09:27:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) [ 264.167586][ T36] audit: type=1804 audit(1608024443.461:21): pid=12091 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir577761275/syzkaller.wKYaQ2/86/bus" dev="sda1" ino=16073 res=1 errno=0 09:27:23 executing program 1: pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x1001, 0x0, 0x0, "181c00e49833ec25f17aa5003903b348", "64305643a92c639127dcde1a12fdb67d2d4bbf3690a8a1b8787f9f8da37c28bcca6384fb5c19d15b71b720e1ca8d1c89d2acec2cfa0eca1fac1b683f5af09d911d72d6ccb16358f79976510319c7a3b0c0b3e8aee0b4813214033c8dadc4865d32e0ddc737de32976432ed340269eb94455cf8c80906d0da190c14da6ae0746120ed257aef2fec74c1e12f0e4a5d2eff1ec51c20b6c903da3af22b1e574f59a75e7c6e53fe978eccb3a63557156cd49abb9c3160fde57376c8b12ccde5241b3a4a5bd75df230b8f6dfbc24f3e442b9ca2deab143f75817dfeb484a930533235dcc5102da5a3b6aea4de3b04ae083b11a0efe81e8cacf9b874a3d46062af00eeadd2f1246e8117596ad1365d6b182b3633cf9d442a6813e10df1815cec0146eb38bc906236e18ad5059f10e1d1924c75aa85bf8c5ca1009bb96f73f09dc1314e6e4f5c11ffd882b6eeaf11795deaaf05993151006de46db264ca9125d53be20ffde827b4e4014d5bd52f440effbcaec89b42f5f9b1e5ab72281c97206a3d41b78a3b454dc522103b462930faf2ff0f0f4e50c6cddd929e827c2a1356ab0c79935ed39e577f12b06352d7e50a54133a806bc0e51e61fb3bb34d3f8d137e1862170c1491c5d042f69c9942e18f378b98aa6772451b29b2ab2fb3478340325dffa786e0261760e0ee881ff24f70808dee4ebbf0c7a9c5a01f35a8efb55cd84542fc8672fe29df4545694f2a09c33a94047bbd45ea673892219a5702beb9085b92627310075a6092b4b74237ea0d37df0846393b6c20ea7f8f3ffe02a85d0ab6040edc10993eb7d4496fd0ded4f6787f43014ca7c29ad45ee02d06e24f5cadeace9548ae958b93341d803022ac4255a093b4d4a9db90bf7e1cd4d3cf281e46c2486b6ec392bbcb5f0b529daa1aa3c94bf5eee258fe14eea1d40b0d0cbd369a0cd820d67bbd91d413120829d14a44f31547859e8d6e7c52c735e1b38690bfe69c790dbe79ad589c5514a1f66c12dd3a1cd1a66cdb9122663d40a82d5a90982d4ec1bab939c9f40e1889f74dd64877e6153de183e8a23174011e823732a424f58618542682e5f7833e9cda601c4526a3958efeb64988fe08367ca1e451f6e8157c57b9216abbb98a44219f861951fcfd33f845412e2446cfe200b36bc6e11a607a14e50b495901d4a12e341e3917566535c7b4eeb43f25dba19cce13b54f3795796df0d43ddc211bfba85b0e3d4fba64d920f264e5e2cff3b7152b81b18f98539c9bdc71750c12824a432263f4b0f9a09337e2f12e4fef6ccbfab4b2019ab8650a8a642e3e6aeded7168b2aa1e761b1149026152277c1b7641c586d2baf71f70d525356dc642528da0130b00f795807c85551450a4635f4e47d74cce8d9c8d0a7bd46be1b2196654767896d16e4593873c4e100b8ff7a7869caaf611513cf3746fb89cc5123021543474615a1c4cf838201684251ba147f2cef1ea19ed2fb34f05ac9b03581f69310ec305f4d5e12e63be26bf3b6675d56c3563d4e71969945aecdb8f2577459527ae7a10a5ab4771984eb8d0e5c2e32eb1e3d6c713c395ef9bb8325e27dcee0e6b211adbf82d7879db99e51b36cea514b34d85ff5dbcf64816073ba4027c305362b86e57636bbeb7675bd2c517dda5f692017a41351c41bbafb4a204038a6cf7c3b63bdb9387080327b81bd71be0c93f3cddae6fa4f97b2405efde5b0ff7b31f4f93d1f5a97f0d4cb0148a09df495701c0aa84f6da2915ec52b4f0c3d7e3602ebe499a64f6e92165c9006ab6b4dfc70818287175938ea4ef905f6d149bc911dbcaa8a4c4c75ba62008bbf5472a339e92e88a1627f7eadc2394b12dc4fdc2644dad1770e8562cba69d020bc1966a47a759681a6f060956e1e6d3578eff8f55a83fde62cb1bb2f815fa988de5f67c7a8c9a64630a15359c03cf7b0a2ef53cbca766d4ece36d368fa39752aa6e897a0daf634e7d30f2def159df633431675e2782f58e4ed1c18bfb9e37c0e4c8cd236b30035636bca2e44862f218c40de0e60df7a97b035988a4c62b6e1776980c832a038a950745f80d2ce9d7c95a8e004e801e53ae528acace4a3dffd26d23340e2b7b6d664bf53b7391750e94bf10b8edb5bd94c13dce8eb8b12b67f8a97e1f217c2ccfaa90e5c7681919660436488f51fcdb47970eb2b8419a9b628a2b0bf4c17e4982d902f778fce6b17053df1531d6c861c330b85271f8d7b48b8f9c58e696121b28574544f75e2b9c4e5a48c9ddb700aceec0f28786ea628f54aab55746ff0acd11098ec3e02e81305cf6225a371a7f8fcfe1ab79acd9052086d0e34c7faf513cd455f28d824032c494f21b5aa30a71a0bf507fdc7d50f0d794c2ce27e7cebc7e464ccb9c435824404d0578d61f417dbeabebf84117575b62e7dea5d26a0f19f816e6e77596c102c0e6f23c5816da6411b59c42c6c7d095caa2761a0efbeaa0cc532b0d48669933cb9d738dae4af71362a6f34bc12cf75e08ebccc1108d924c1fdeac65502053d46c27b119eab6c5f1f8673368491e37e94c94e7c1a7069be5efa8227e08014ff3daf95f6fdc0b70f37342bff85d8f69d1b2b3b9f47c0ac647e56c6b7f26f403569ce0da9cd9d61d98fd00c1fe95b28a74872c5405b316da28822f76d84cc070395c954a7cff14d71dc6779b56da399a9082bc1b4a94fd7103ae1771442af85a9b3e6b99ac3329a6f32b0d4c6377f04ee6cfc6a0b3b1c5ebb1cb09dabf85e6d431d7abeb50cdb73d76fb5da817e74f3c6d1fd9daea6f5399ce17220ef60d76b35b2bddf10c9b0f27b67fcc02ca55ab25659a129060c6d3238ac76033cc35a4b829742dd7a7816c236d955aa1fdcfd362386b8b823b5bd2b62817b8ddb0eea674595120afdaa2f79b8af69ae205eef5e77e43849d4a256de1c97c8e6f7860574a21c115ee76c2f587ba389dfbad48d64b8df2ad6783a4ea37eb60d98eb533d020dedf4772c9ac6ac084dba6a93a0edea62fbe958a58bbfb534a68a890a7c6fdcca3db8c629c940513b570193d28918d5a0b9be6c15671c193209f9f7a93cfd71f4c01d69b317b6ac6d3c7ded0c3b623cf0e26ce08f193c93bc11c8353905bd51beb34290f699069c698a08cfb61457049648681614396cdc20a8805ec6cf815d06cca15fb352289d3289ef9ce87a2e67bd3e1fcc13e8c4a60648bd4bf904c96ddeafa8c2deb04d144c44918df104a869590be36fcff8f5029a1b3e2263d4027f7a2857004585a9d4f74d303b01ec74502d64030c68245b11093a0dc82579baff8a76535c0f56000d1f37f19d0354031ec15c3372ffd71ad95530d64ab4314e209172b663a16cd9bfe9991542550e12b2f28c9ac0882573fb7df62880cfa5b61b313566fae740f80ed4cb29b10dac5fee71837c34e0aa230eb025e9298462ae1803405fb569d61e1b406635f98d72238a8d200baca183b42b1ab3f335ef6b8b9796cef016ae2c8b16239c1dd81e942e54aa317882ec3806b9148c716644722b6a9a5f9d1fe60586eea8982245bc7a593a65329e5608f32938c81400f3df87ffc81ba3f7aa9f468323e8c72d73836819b7cadb09a3fdfb0ef820fcd23d764f61fb86c3caa86cab7ccc724ff5cf90d8c7d95177b605b73acf46b6796e2f9bd947ba02db3323c61916c688f60a3a6d803c11592baf59587c8848a9953b2e506daf95b61429bdfb169951b2badae627b17761a75a3ada196e884c416516e0413f7568481487986ab79f2c9ad79448efaef42e0f697f3bad4e1f14a6ada21137132101fa82e263a100029ea24a05940e11c766e73e26d7efa8898cc15dff215cca84216881972847782fcc68d52e96d6dd55fe83702795925de1bfbcae2528448e60e88262f7a25c3c893200162053ff5d47dc2448cba286f21eb8f8a29fcb72b9ec5e0a72ac416dcfaf867536010d3f41b4f0ba888486c3cbea4f35a0fc667930c9d86b1d6c004d0487688239bc9851dd53f833eee9dee1d977ad74f2aebc8f2225de9602c76957dfc7f1c096064699ca4104f82297470c8abf2d1f3631f34f36ee1ab0f1ee8e09a580d48d4b133c2308c6f8919973f9a6f019236ce0dd4eca3a30f18a0e5a706fc3338f89719028ccc59f92cc5b10efccb5d8a866a89fc9b29aae8ea462b58e91ad5b3e5c983ab5753a31e25e3e05e23acbe967df8894c9d54c3268d9ad91c834c9686315e690543f6f7d76ae03422f5dbb739db28165ee3c9cf88723ea7b0ed69a6cc68ad65f32d4946ce27c0e97e84c8f4b4967f94fa4b69d655b2c73fe3588951d6f2f2e9c2d4d9634697e062f5dc521eaca4a686be068cad95bcfaa9f32a34ed20ddb53891afa97856409d3a0583843bd9be4f39ff11a8d47ee57d10ecfe468b81035a7385b26e85c9b112458c06c81189015d199e5de99925ca8ffcd269d8fbea7e43ca9c56b58eeb8e5caa5ec7918adb1c16f88998b84f44dcc6c41e09523bc8b7362b07e1792039269400401bb2f09e9f8f7912c02147fa26e0f7ee708d38c519e60e2fd49febbf7aa53bc1dfb29e604d397b69b1324dfe80687ec0108d41d9c12ba7ebc8b4cade9b30487bb26cd05a9c83cc6e193a4c7c58b35abbcd6fce81e6556da459d30caf7e0a326185cf5bf13642ce79655f59667655e7248e84f2ded837d9d4db68e045c99434bddee0221eebd1e5fe8f7c1b7acfb153e76d5f4fe53af68ff42cdbeb95cdbe740319084fe9eac008bdd995b8017d70185fc84b185cdb215478f5e62596c27238385c20321a0c2d562ab151336571dcd75c6800c078dc616dec927939a4ce53d7680f277cee458d09312f6252149c641cae2f0f0712feb8df7da76df8d383ca64b23ca0cc1218e122f3f904d70a99520b96bd18320da800f4e3ae6431977d505568b71b7f09b97d064223428097cf998d1c5b38bfe734ff6c3e993ea1d61817a7192f112078a8cfff938f6bc4e37e81d84e77e6a5c8f2b685593a733479410ac256872bf954ec705208ce04bbf6f5a9631b7c5b8240bab9ed26cd087e7f4957b40bd04d1b6fd7618476299f8e6de0a2b1b80a7467547c55d729f58754865a03d449c324982a0d505473bdfb635ed4756f616dbfd4b89650b436072064dfc266ee9d27bc00afdb701b9fe2cc3bd75d025590c2aef6240df5ef2b031497cb45d3d1b4af87ad641f632074793f0ff59f7846019dfd475aa47d1eb8dba7b993b2d6699f336ae9c66138b8f0267bebde5094b762f9c722d06c8b67d5617fce891ddfdf115ecfa1336ac19e52cd488afc267a23be41b206fd4c84195cf8b12e0ef37af754aee613dcfd2d8904f7e8837d9ddc36b06c6adad8aed3d7e10dafa4ea777fc1f301688445586bc8457b826d5a5939f832e3c0f0133afaa026a7b9c4359c316b42cd1bbbcf7a36229f581a06fee7c817c4991126dc9a7e4d4c2bf37d2a9e281e6424dacf04d749c3f0634203ad3ab4bfa2b891a57f807af4ae46c9abe26906d6f430c8b00bfa65c919956086da35a98b7d22199bd8e6b445f707c211046b92c03371e4cce2f6f3f47ea81f8e667c99bb3e13fe6ce75bae574c4f64d5dcb3137b5f0aede6321bad3af84e93a93603cb3532eb4bc7c5e7b6b0add64b11ae5088cc14822be22efdc3b6182695e43f65f43b48121f477e94d8ae30cb06ec584ffde232e6bea14b8b56b549bf4bc6ca7210282663b5f81194dcaa3072efbb0648018f7251387df2bad1c7d0e6e5b93e3d82157f0b34762c454c4f77a9ad1aebabaea1b0"}, 0x1001, 0x0) 09:27:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="b5eed4af01db22b7c134010000007a15", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 09:27:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce, 0x1}, 0x20) [ 264.277139][ T36] audit: type=1804 audit(1608024443.541:22): pid=12083 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir577761275/syzkaller.wKYaQ2/86/bus" dev="sda1" ino=16073 res=1 errno=0 09:27:23 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x3, [{{0x9, 0x4, 0x0, 0xf7, 0x2, 0x7, 0x1, 0x0, 0x5, "", {{{0x9, 0x5, 0x1, 0x2, 0x10}}}}}]}}]}}, &(0x7f00000002c0)={0xa, &(0x7f0000000040)={0xa}, 0x0, 0x0, 0x2, [{0x2, &(0x7f00000000c0)=@string={0x2}}, {0x14, &(0x7f0000000240)=@string={0x14, 0x3, "dbf7a25e513865d3fb8bfc51ffc7a3f571dc"}}]}) 09:27:23 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x9}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9}]}, 0x24}}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x4f6, 0x8, 0xffffffffffffffff, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 09:27:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 09:27:23 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x9d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201010202d61d202505a1a440000102030109028b00010102800909"], &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0}) 09:27:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 09:27:24 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000140)={0x200, 0x6}) 09:27:24 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000040), 0x8) 09:27:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 09:27:24 executing program 5: bpf$MAP_CREATE(0x19, 0x0, 0x0) [ 264.869573][ T17] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 264.939756][ T9822] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 265.119710][ T17] usb 5-1: Using ep0 maxpacket: 32 [ 265.192539][ T9822] usb 2-1: Using ep0 maxpacket: 32 [ 265.251342][ T17] usb 5-1: config 1 interface 0 altsetting 247 bulk endpoint 0x1 has invalid maxpacket 16 [ 265.270909][ T17] usb 5-1: config 1 interface 0 altsetting 247 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 265.325320][ T17] usb 5-1: config 1 interface 0 has no altsetting 0 [ 265.350148][ T9822] usb 2-1: unable to get BOS descriptor or descriptor too short [ 265.370033][ T17] usb 5-1: language id specifier not provided by device, defaulting to English [ 265.429725][ T9822] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 265.439983][ T9822] usb 2-1: config 1 has 0 interfaces, different from the descriptor's value: 1 [ 265.489725][ T17] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 265.498842][ T17] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 265.507221][ T17] usb 5-1: Product: syz [ 265.511489][ T17] usb 5-1: Manufacturer: 庢㡑퍥读凼쟿 [ 265.517913][ T17] usb 5-1: SerialNumber: syz [ 265.540157][T12123] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 265.599738][ T9822] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 265.609002][ T9822] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 265.617206][ T9822] usb 2-1: Product: syz [ 265.621671][ T9822] usb 2-1: Manufacturer: syz [ 265.626771][ T9822] usb 2-1: SerialNumber: syz [ 265.803882][ T17] usb 5-1: USB disconnect, device number 5 [ 265.912160][ T9822] usb 2-1: USB disconnect, device number 4 [ 266.549634][ T17] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 266.649577][ T2991] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 266.809565][ T17] usb 5-1: Using ep0 maxpacket: 32 [ 266.922377][ T2991] usb 2-1: Using ep0 maxpacket: 32 [ 266.949953][ T17] usb 5-1: config 1 interface 0 altsetting 247 bulk endpoint 0x1 has invalid maxpacket 16 [ 266.960583][ T17] usb 5-1: config 1 interface 0 altsetting 247 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 266.976806][ T17] usb 5-1: config 1 interface 0 has no altsetting 0 [ 267.020132][ T17] usb 5-1: language id specifier not provided by device, defaulting to English [ 267.099857][ T2991] usb 2-1: unable to get BOS descriptor or descriptor too short [ 267.149607][ T17] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 267.160583][ T17] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 267.168695][ T17] usb 5-1: Product: syz [ 267.173231][ T17] usb 5-1: Manufacturer: 庢㡑퍥读凼쟿 [ 267.180152][ T2991] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 267.190336][ T17] usb 5-1: SerialNumber: syz [ 267.195725][ T2991] usb 2-1: config 1 has 0 interfaces, different from the descriptor's value: 1 [ 267.230264][T12123] raw-gadget gadget: fail, usb_ep_enable returned -22 09:27:26 executing program 4: bpf$MAP_CREATE(0x16, 0x0, 0x0) 09:27:26 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200), 0x8) 09:27:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce}, 0x20) [ 267.369690][ T2991] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 267.378945][ T2991] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 267.387165][ T2991] usb 2-1: Product: syz [ 267.391530][ T2991] usb 2-1: Manufacturer: syz [ 267.396207][ T2991] usb 2-1: SerialNumber: syz [ 267.509198][ T17] usb 5-1: USB disconnect, device number 6 09:27:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) timer_getoverrun(0x0) 09:27:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce}, 0x20) 09:27:27 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:27:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:27 executing program 4: bpf$MAP_CREATE(0x2, &(0x7f0000000040), 0x40) 09:27:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:27 executing program 5: prctl$PR_SET_MM_MAP(0x28, 0xe, 0x0, 0x0) 09:27:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) semget$private(0x0, 0x20000000102, 0x0) 09:27:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xad9, [{0x0, 0x5, 0x2}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/206, 0x3e, 0xce}, 0x20) [ 267.712379][ T2991] usb 2-1: USB disconnect, device number 5 09:27:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, 0x0, 0x0, 0xffffffffffffffff) 09:27:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 09:27:27 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 09:27:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 09:27:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:27 executing program 0: socketpair(0x29, 0x2, 0x0, &(0x7f0000000080)) 09:27:27 executing program 1: bpf$MAP_CREATE(0x8, &(0x7f0000000040), 0x40) 09:27:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:27 executing program 4: clock_gettime(0x95b197e8b469a367, 0x0) 09:27:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:27 executing program 0: io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 09:27:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone3(0x0, 0x0) 09:27:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000340)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}}, 0x0) [ 268.410085][ T35] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 268.682625][ T35] usb 6-1: Using ep0 maxpacket: 32 [ 268.800557][ T35] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 269.070387][ T35] usb 6-1: string descriptor 0 read error: -22 [ 269.076707][ T35] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 269.087220][ T35] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 269.332546][ T35] usb 6-1: USB disconnect, device number 2 [ 270.109628][ T9653] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 270.349549][ T9653] usb 6-1: Using ep0 maxpacket: 32 [ 270.469659][ T9653] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 270.719664][ T9653] usb 6-1: string descriptor 0 read error: -22 [ 270.725928][ T9653] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 270.735467][ T9653] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:27:30 executing program 5: socket(0x1e, 0x0, 0x8) 09:27:30 executing program 3: pipe2(&(0x7f0000000080), 0x0) 09:27:30 executing program 0: prctl$PR_SET_MM_MAP(0xe, 0xe, 0x0, 0x0) 09:27:30 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x9d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201010202d61d202505a1a440000102030109028b0001010280090904000503020600010624060000c40524003f000d240f0109000000ff"], &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000280)=@lang_id={0x4}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4}}]}) 09:27:30 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:30 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7, 0x0) 09:27:30 executing program 3: pipe2(&(0x7f0000000080), 0x0) 09:27:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 270.989943][ T35] usb 6-1: USB disconnect, device number 3 09:27:30 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:30 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1380402, 0x0) 09:27:30 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000040), 0x40) 09:27:30 executing program 3: pipe2(&(0x7f0000000080), 0x0) 09:27:30 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x700) 09:27:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:30 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 271.339593][ T9653] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 271.589782][ T9653] usb 2-1: Using ep0 maxpacket: 32 [ 271.789871][ T9653] usb 2-1: unable to get BOS descriptor or descriptor too short [ 271.874736][ T9653] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 271.885133][ T9653] usb 2-1: config 1 interface 0 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 271.904186][ T9653] usb 2-1: config 1 interface 0 has no altsetting 0 [ 272.099777][ T9653] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 272.108833][ T9653] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 272.116945][ T9653] usb 2-1: Product: syz [ 272.121237][ T9653] usb 2-1: SerialNumber: syz [ 272.481791][ T9653] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 272.497232][ T9653] usb 2-1: USB disconnect, device number 6 [ 273.139663][ T2991] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 273.379615][ T2991] usb 2-1: Using ep0 maxpacket: 32 [ 273.540474][ T2991] usb 2-1: unable to get BOS descriptor or descriptor too short [ 273.619703][ T2991] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 273.629992][ T2991] usb 2-1: config 1 interface 0 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 273.646843][ T2991] usb 2-1: config 1 interface 0 has no altsetting 0 [ 273.809753][ T2991] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 273.819287][ T2991] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 273.827599][ T2991] usb 2-1: Product: syz [ 273.832170][ T2991] usb 2-1: SerialNumber: syz 09:27:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) 09:27:33 executing program 5: unshare(0x2a000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000100)={r5, 0x0, 0x2, 0xffffffffffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 09:27:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:33 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:33 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x9d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201010202d61d202505a1a44000010203010902"], &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000280)=@lang_id={0x4}}, {0x7e, &(0x7f0000000b40)=@string={0x7e, 0x3, "17e980ea6a9dddf7b41daf117229f4e92ad04002f6d51668266d995dcd2713b5e3991714ae19328c100b1c4a1a84290eed7bebd24a09054d35294613b6aab505c1c7c39945b6a308a605f1d17962ef6a4943c0fced63acf6e361f35aa5e0e19e33e1e0397a3ad062fc03fe5ace51ed32c5ff57f008fa7ea07c2b63db"}}]}) 09:27:33 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 09:27:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) 09:27:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 274.123407][ T2991] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 274.154656][ T2991] usb 2-1: USB disconnect, device number 7 09:27:33 executing program 5: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0xc, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "01f68c0e"}, 0x0, 0x0, @userptr}) 09:27:33 executing program 4: waitid(0x2, 0x0, &(0x7f0000000000), 0x4, 0x0) 09:27:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) 09:27:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:33 executing program 5: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 09:27:33 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 274.609874][ T2991] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 274.849614][ T2991] usb 2-1: Using ep0 maxpacket: 32 [ 275.010060][ T2991] usb 2-1: unable to get BOS descriptor or descriptor too short [ 275.090078][ T2991] usb 2-1: config 0 has no interfaces? [ 275.259691][ T2991] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 275.268830][ T2991] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 275.277493][ T2991] usb 2-1: Product: syz [ 275.282081][ T2991] usb 2-1: Manufacturer: 鵪ᶴᆯ⥲퀪ɀ헶栖洦嶙⟍딓駣ᐗ᦮谲ଐ䨜萚ษ篭틫ॊ䴅⤵ፆꪶֵ쟁駃뙅ࢣ֦퇱批櫯䍉ﳀ揭懣嫳黡㧠㩺拐ϼ嫾凎㋭ᅤ行ꁾ⭼ [ 275.302369][ T2991] usb 2-1: SerialNumber: syz [ 275.313177][ T2991] usb 2-1: config 0 descriptor?? [ 275.557625][ T9822] usb 2-1: USB disconnect, device number 8 [ 276.349673][ T7] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 276.609649][ T7] usb 2-1: Using ep0 maxpacket: 32 [ 276.811149][ T7] usb 2-1: unable to get BOS descriptor or descriptor too short [ 276.899996][ T7] usb 2-1: config 0 has no interfaces? 09:27:36 executing program 1: socketpair(0x2c, 0x3, 0xc15, &(0x7f0000000080)) 09:27:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) pipe2(&(0x7f0000000080), 0x0) 09:27:36 executing program 0: shmctl$SHM_LOCK(0x0, 0xb) 09:27:36 executing program 4: io_setup(0x1, &(0x7f0000000040)) io_setup(0xa3c, &(0x7f0000000000)) 09:27:36 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x5}, 0x0, 0x0) 09:27:36 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 277.079815][ T7] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 277.088880][ T7] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 277.097451][ T7] usb 2-1: Product: syz [ 277.102225][ T7] usb 2-1: Manufacturer: 鵪ᶴᆯ⥲퀪ɀ헶栖洦嶙⟍딓駣ᐗ᦮谲ଐ䨜萚ษ篭틫ॊ䴅⤵ፆꪶֵ쟁駃뙅ࢣ֦퇱批櫯䍉ﳀ揭懣嫳黡㧠㩺拐ϼ嫾凎㋭ᅤ行ꁾ⭼ [ 277.122506][ T7] usb 2-1: SerialNumber: syz [ 277.130094][ T7] usb 2-1: config 0 descriptor?? 09:27:36 executing program 0: shmctl$SHM_LOCK(0x0, 0xb) 09:27:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000002280)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) [ 277.179775][ T7] usb 2-1: can't set config #0, error -71 [ 277.197415][ T7] usb 2-1: USB disconnect, device number 9 09:27:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) pipe2(&(0x7f0000000080), 0x0) 09:27:36 executing program 4: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000080)) 09:27:36 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:36 executing program 0: shmctl$SHM_LOCK(0x0, 0xb) 09:27:36 executing program 5: socket(0x1e, 0x0, 0x40) 09:27:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) pipe2(&(0x7f0000000080), 0x0) 09:27:36 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000001700)) 09:27:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 09:27:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 09:27:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) pipe2(&(0x7f0000000080), 0x0) 09:27:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) 09:27:37 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) 09:27:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 09:27:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) pipe2(&(0x7f0000000080), 0x0) 09:27:37 executing program 4: pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$nbd(r0, 0x0, 0x87) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 09:27:37 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x492492492492805, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 09:27:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) pipe2(&(0x7f0000000080), 0x0) 09:27:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 09:27:37 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x492492492492805, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:37 executing program 4: bpf$MAP_CREATE(0x2, 0x0, 0x0) getpgrp(0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) socket$inet(0x2, 0x5, 0x0) 09:27:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf}, 0x40) 09:27:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580)='nl80211\x00') sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 09:27:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:38 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000000000040341a05f740000000000109022400010000000009040000010301000009210000000122010009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x22, 0x1, {[@global]}}, 0x0}, 0x0) 09:27:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:38 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000000)=@rc={0x1f, @none}, &(0x7f0000000080)=0x80) 09:27:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:38 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) pipe2(&(0x7f0000000080), 0x80000) bind(0xffffffffffffffff, &(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 09:27:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) shmctl$SHM_LOCK(0x0, 0xb) [ 278.972815][ T36] audit: type=1326 audit(1608024458.271:23): auid=0 uid=0 gid=0 ses=4 subj=_ pid=12593 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:38 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 279.110076][ T9822] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 279.240420][T12613] fuse: Bad value for 'fd' [ 279.477570][ T9822] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 279.489004][ T9822] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 279.507807][ T9822] usb 2-1: New USB device found, idVendor=1a34, idProduct=f705, bcdDevice= 0.40 [ 279.533303][ T9822] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 279.565824][ T9822] usb 2-1: config 0 descriptor?? [ 280.057635][ T9822] acrux 0003:1A34:F705.0001: hidraw0: USB HID v0.00 Device [HID 1a34:f705] on usb-dummy_hcd.1-1/input0 [ 280.078190][ T9822] acrux 0003:1A34:F705.0001: no inputs found [ 280.085473][ T9822] acrux 0003:1A34:F705.0001: Failed to enable force feedback support, error: -19 [ 280.259391][ T9822] usb 2-1: USB disconnect, device number 10 [ 281.049710][ T9934] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 281.439973][ T9934] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 281.451057][ T9934] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 281.463511][ T9934] usb 2-1: New USB device found, idVendor=1a34, idProduct=f705, bcdDevice= 0.40 [ 281.473131][ T9934] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 281.488130][ T9934] usb 2-1: config 0 descriptor?? 09:27:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000080)=""/241, 0xf1, 0x22, 0x0, 0x0) 09:27:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xa}, 0x40) 09:27:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140), 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:41 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) 09:27:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 281.869688][ T9934] usbhid 2-1:0.0: can't add hid device: -71 [ 281.876334][ T36] audit: type=1326 audit(1608024461.171:24): auid=0 uid=0 gid=0 ses=4 subj=_ pid=12663 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 281.896555][ T9934] usbhid: probe of 2-1:0.0 failed with error -71 [ 281.914603][T12665] fuse: Bad value for 'fd' 09:27:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0xd98ebda0df59ff5f, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 281.939217][ T9934] usb 2-1: USB disconnect, device number 11 09:27:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:41 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8141, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, &(0x7f0000000200)) 09:27:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140), 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) timer_delete(0x0) 09:27:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 282.172902][T12687] fuse: Bad value for 'fd' 09:27:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) pipe2(&(0x7f0000000080), 0x0) 09:27:42 executing program 4: pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RAUTH(r0, 0x0, 0x0) 09:27:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:42 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x0, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x0) 09:27:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140), 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:42 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) dup2(r0, r0) 09:27:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 282.792642][ T36] audit: type=1326 audit(1608024462.091:25): auid=0 uid=0 gid=0 ses=4 subj=_ pid=12715 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:42 executing program 1: socketpair(0x1, 0x0, 0x6, &(0x7f0000000000)) [ 282.860373][ T36] audit: type=1326 audit(1608024462.111:26): auid=0 uid=0 gid=0 ses=4 subj=_ pid=12719 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000440)={'wlan1\x00'}) 09:27:42 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(0x0, 0x0) 09:27:42 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x9d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201010202d61d202505a1a44000010203010902"], &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) 09:27:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000140)=@proc, 0x4) 09:27:42 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) shmctl$SHM_LOCK(0x0, 0xb) 09:27:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(0x0, 0x0) 09:27:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:43 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 283.693423][ T36] audit: type=1326 audit(1608024462.991:27): auid=0 uid=0 gid=0 ses=4 subj=_ pid=12751 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe2(0x0, 0x0) 09:27:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 283.940997][ T2991] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 284.181483][ T2991] usb 2-1: Using ep0 maxpacket: 32 [ 284.340030][ T2991] usb 2-1: unable to get BOS descriptor or descriptor too short [ 284.437060][ T2991] usb 2-1: config 0 has no interfaces? [ 284.679750][ T2991] usb 2-1: string descriptor 0 read error: -22 [ 284.686087][ T2991] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 284.695255][ T2991] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 284.705994][ T2991] usb 2-1: config 0 descriptor?? [ 284.953534][ T2991] usb 2-1: USB disconnect, device number 12 [ 285.739673][ T2991] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 285.979675][ T2991] usb 2-1: Using ep0 maxpacket: 32 [ 286.139934][ T2991] usb 2-1: unable to get BOS descriptor or descriptor too short [ 286.219742][ T2991] usb 2-1: config 0 has no interfaces? [ 286.459751][ T2991] usb 2-1: string descriptor 0 read error: -22 [ 286.466024][ T2991] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 286.477134][ T2991] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 286.491022][ T2991] usb 2-1: config 0 descriptor?? 09:27:45 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x55, 0xd5, 0xa9}}]}}]}}, 0x0) 09:27:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:45 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4d0201, 0x0) 09:27:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:45 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) shmctl$SHM_LOCK(0x0, 0xb) [ 286.636227][ T9934] usb 2-1: USB disconnect, device number 13 09:27:46 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) 09:27:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 286.739941][ T36] audit: type=1326 audit(1608024466.041:28): auid=0 uid=0 gid=0 ses=4 subj=_ pid=12824 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:46 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) 09:27:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 287.189730][ T9934] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 287.449871][ T9934] usb 2-1: Using ep0 maxpacket: 32 [ 287.769864][ T9934] usb 2-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 287.778969][ T9934] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 287.788352][ T9934] usb 2-1: Product: syz [ 287.793308][ T9934] usb 2-1: Manufacturer: syz [ 287.797913][ T9934] usb 2-1: SerialNumber: syz [ 287.805241][ T9934] usb 2-1: config 0 descriptor?? [ 287.857265][ T9934] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 287.866926][ T9934] usb 2-1: Detected FT-X [ 288.071165][ T9934] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 288.089729][ T9934] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 288.110097][ T9934] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 288.122547][ T9934] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 288.142905][ T9934] usb 2-1: USB disconnect, device number 14 [ 288.155270][ T9934] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 288.180535][ T9934] ftdi_sio 2-1:0.0: device disconnected [ 288.829712][ T2991] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 289.099687][ T2991] usb 2-1: Using ep0 maxpacket: 32 [ 289.420401][ T2991] usb 2-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 289.429472][ T2991] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 289.438769][ T2991] usb 2-1: Product: syz [ 289.443989][ T2991] usb 2-1: Manufacturer: syz [ 289.448586][ T2991] usb 2-1: SerialNumber: syz [ 289.455933][ T2991] usb 2-1: config 0 descriptor?? [ 289.501165][ T2991] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 289.509355][ T2991] usb 2-1: Detected FT-X 09:27:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mq_notify(0xffffffffffffffff, 0x0) 09:27:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:49 executing program 1: clock_gettime(0x7, &(0x7f0000000280)) 09:27:49 executing program 0: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x24, &(0x7f0000000080)={[{0x1d, 0x4e00, "9d08bd192110210baff1ac207902ed33db7bb142e918aef0e0b0d0bd73"}]}) [ 289.720515][ T2991] ftdi_sio ttyUSB0: Unable to read latency timer: -71 09:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) [ 289.769746][ T2991] ftdi_sio ttyUSB0: Unable to write latency timer: -71 09:27:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:49 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000080)) [ 289.819814][ T2991] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 289.842062][ T2991] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 09:27:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:49 executing program 3: recvfrom$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 289.907353][ T2991] usb 2-1: USB disconnect, device number 15 [ 289.971619][ T2991] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 290.010630][ T2991] ftdi_sio 2-1:0.0: device disconnected 09:27:49 executing program 1: syz_usb_connect(0x3, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x55, 0xd5, 0xa9, 0x0, [], [{}]}}]}}]}}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 09:27:49 executing program 3: bpf$MAP_CREATE(0x9, &(0x7f0000000040), 0x40) 09:27:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 290.109717][ T17] usb 1-1: new high-speed USB device number 4 using dummy_hcd 09:27:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 290.529786][ T7] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 290.680233][ T17] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 290.689304][ T17] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 290.698065][ T17] usb 1-1: Product: syz [ 290.702687][ T17] usb 1-1: Manufacturer: syz [ 290.708257][ T17] usb 1-1: SerialNumber: syz [ 290.761539][ T17] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 290.779989][ T7] usb 2-1: Using ep0 maxpacket: 32 [ 290.900198][ T7] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 291.169911][ T7] usb 2-1: string descriptor 0 read error: -22 [ 291.176175][ T7] usb 2-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 291.192110][ T7] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 291.205740][ T7] usb 2-1: config 0 descriptor?? [ 291.251293][ T7] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 291.264599][ T7] usb 2-1: Detected FT-X [ 291.459746][ T7] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 291.480106][ T17] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 291.489751][ T7] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 291.519807][ T7] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 291.528455][ T7] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 291.550674][ T7] usb 2-1: USB disconnect, device number 16 [ 291.563378][ T7] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 291.580564][ T7] ftdi_sio 2-1:0.0: device disconnected [ 291.893885][ T2991] usb 1-1: USB disconnect, device number 4 [ 292.239948][ T9934] usb 2-1: new high-speed USB device number 17 using dummy_hcd [ 292.509704][ T9934] usb 2-1: Using ep0 maxpacket: 32 [ 292.519946][ T17] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 292.527281][ T17] ath9k_htc: Failed to initialize the device [ 292.535442][ T2991] usb 1-1: ath9k_htc: USB layer deinitialized [ 292.649867][ T9934] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 09:27:52 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000400)={&(0x7f0000000000), 0xc, 0x0}, 0x38, 0x0) 09:27:52 executing program 3: mq_open(&(0x7f00000000c0)='{/%\xf6\x00', 0x0, 0x0, 0x0) 09:27:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 292.909758][ T2991] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 292.940150][ T9934] usb 2-1: string descriptor 0 read error: -22 [ 292.946641][ T9934] usb 2-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 292.957599][ T9934] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 292.968331][ T9934] usb 2-1: config 0 descriptor?? 09:27:52 executing program 3: mq_open(&(0x7f00000000c0)='{/%\xf6\x00', 0x0, 0x0, 0x0) 09:27:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 293.011234][ T9934] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 293.043498][ T9934] usb 2-1: Detected FT-X 09:27:52 executing program 1: syz_usb_connect(0x3, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x55, 0xd5, 0xa9, 0x0, [], [{}]}}]}}]}}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 09:27:52 executing program 0: prctl$PR_SET_MM_MAP(0x34, 0xe, 0x0, 0x0) 09:27:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.269745][ T9934] ftdi_sio ttyUSB0: Unable to read latency timer: -71 09:27:52 executing program 3: syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x123d42) 09:27:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 293.310572][ T9934] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 293.349959][ T9934] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 09:27:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:52 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 293.363214][T13052] fuse: Bad value for 'fd' [ 293.375154][ T9934] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 09:27:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.451234][ T9934] usb 2-1: USB disconnect, device number 17 09:27:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, 0x0) [ 293.497890][ T9934] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 293.533785][ T9934] ftdi_sio 2-1:0.0: device disconnected 09:27:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x111}}, 0x20) 09:27:53 executing program 0: r0 = gettid() openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) waitid(0x1, r0, &(0x7f0000000000), 0x2, 0x0) 09:27:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.727852][T13084] fuse: Bad value for 'fd' [ 293.939714][ T9934] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 294.179716][ T9934] usb 2-1: Using ep0 maxpacket: 32 [ 294.299775][ T9934] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 294.559778][ T9934] usb 2-1: string descriptor 0 read error: -22 [ 294.566474][ T9934] usb 2-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 294.577118][ T9934] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 294.590426][ T9934] usb 2-1: config 0 descriptor?? [ 294.630958][ T9934] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 294.639448][ T9934] usb 2-1: Detected FT-X [ 294.859803][ T9934] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 294.879741][ T9934] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 294.899779][ T9934] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 294.911764][ T9934] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 294.932065][ T9934] usb 2-1: USB disconnect, device number 18 [ 294.949949][ T9934] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 294.965949][ T9934] ftdi_sio 2-1:0.0: device disconnected 09:27:54 executing program 1: syz_usb_connect(0x3, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x55, 0xd5, 0xa9, 0x0, [], [{}]}}]}}]}}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 09:27:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:54 executing program 3: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x79, 0xa, 0x27, 0x20, 0x5d1, 0x1001, 0xc7ad, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x3, 0x55, 0xd5, 0xa9, 0x0, [], [{{0x9, 0x5, 0xb, 0x3, 0x0, 0x6, 0x0, 0x0, [@generic={0x2}]}}, {{0x9, 0x5, 0xa, 0x0, 0x3ff}}, {{0x9, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, [@uac_iso={0x7}]}}]}}]}}]}}, 0x0) 09:27:54 executing program 0: waitid(0x2, 0x0, 0x0, 0x4, &(0x7f0000000080)) 09:27:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x19, &(0x7f00000000c0)={@link_local, @dev, @val, {@llc_tr={0x11, {@llc={0x0, 0x0, '\b'}}}}}, 0x0) 09:27:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 295.472886][T13139] fuse: Bad value for 'fd' 09:27:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:55 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x0, 0x80002, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x4f6, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 295.681247][ T36] audit: type=1326 audit(1608024474.981:29): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13153 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 295.769822][ T2991] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 295.791240][ T9934] usb 2-1: new high-speed USB device number 19 using dummy_hcd [ 296.040136][ T9934] usb 2-1: Using ep0 maxpacket: 32 [ 296.049828][ T2991] usb 4-1: Using ep0 maxpacket: 32 [ 296.160198][ T9934] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 296.180297][ T2991] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 296.190916][ T2991] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid maxpacket 1023, setting to 64 [ 296.202857][ T2991] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 296.390187][ T2991] usb 4-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 296.399265][ T2991] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 296.410103][ T9934] usb 2-1: string descriptor 0 read error: -22 [ 296.410373][ T2991] usb 4-1: Product: syz [ 296.417756][ T9934] usb 2-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 296.423708][ T2991] usb 4-1: Manufacturer: syz [ 296.435344][ T2991] usb 4-1: SerialNumber: syz [ 296.439875][ T9934] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 296.482524][ T9934] usb 2-1: config 0 descriptor?? [ 296.482642][ T2991] usb 4-1: config 0 descriptor?? [ 296.549111][ T9934] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 296.560758][ T9934] usb 2-1: Detected FT-X [ 296.563789][ T2991] ftdi_sio 4-1:0.0: FTDI USB Serial Device converter detected [ 296.598702][ T2991] usb 4-1: Detected FT-X [ 296.620237][ T2991] ftdi_sio ttyUSB1: Overriding wMaxPacketSize on endpoint 11 [ 296.627646][ T2991] ftdi_sio ttyUSB1: Overriding wMaxPacketSize on endpoint 2 [ 296.749867][ T9934] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 296.769769][ T9934] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 296.784392][ T2991] ftdi_sio ttyUSB1: Unable to read latency timer: -71 [ 296.789865][ T9934] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 296.811602][ T9934] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 296.824637][ T9934] usb 2-1: USB disconnect, device number 19 [ 296.825288][ T2991] ftdi_sio ttyUSB1: Unable to write latency timer: -71 [ 296.838942][ T9934] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 296.858979][ T9934] ftdi_sio 2-1:0.0: device disconnected [ 296.869979][ T2991] ftdi_sio 4-1:0.0: GPIO initialisation failed: -71 [ 296.895672][ T2991] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB1 [ 296.928657][ T2991] usb 4-1: USB disconnect, device number 7 [ 296.953624][ T2991] ftdi_sio ttyUSB1: FTDI USB Serial Device converter now disconnected from ttyUSB1 [ 296.971818][ T2991] ftdi_sio 4-1:0.0: device disconnected 09:27:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4008ae6a, &(0x7f0000000100)={r5, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 09:27:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:56 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x3c0, 0x0) [ 297.539783][ T17] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 297.779755][ T17] usb 4-1: Using ep0 maxpacket: 32 [ 297.899821][ T17] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 297.911213][ T17] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid maxpacket 1023, setting to 64 [ 297.922132][ T17] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 298.089742][ T17] usb 4-1: New USB device found, idVendor=05d1, idProduct=1001, bcdDevice=c7.ad [ 298.098826][ T17] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 298.108432][ T17] usb 4-1: Product: syz [ 298.113467][ T17] usb 4-1: Manufacturer: syz [ 298.118149][ T17] usb 4-1: SerialNumber: syz [ 298.125644][ T17] usb 4-1: config 0 descriptor?? [ 298.171212][ T17] ftdi_sio 4-1:0.0: FTDI USB Serial Device converter detected [ 298.179468][ T17] usb 4-1: Detected FT-X [ 298.194265][ T17] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 11 [ 298.204150][ T17] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 2 09:27:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x9}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x40000004}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88d1}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="d45f46bd5a2ea13b4811caadf09709840d6548a36bb0079b36c8ac9fdf90c435a24834a8f6e36bf85a980c569b193446b0ca3d00000000000000000049412e082dc570c03adac4da5c10fa6c4b634c00181f9edc62e84a75524b292413d0750e6ec93e8f4643aef2603d4a0b3798162ea500"/128, @ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000028006000e004e23000005000d0000000000060002004e21000006000f00403a000008000800dd0000000800098000000000000000000900000014000100ff0000000000000000000000000000010800050005000000600003801400060000000000000000000000ffffffffffff0800010002000000060007004e2400001400020076657468305f74"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) dup(0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0xa10000, 0x4f6, 0x8, r4, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:57 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:57 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x9}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x40000004}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88d1}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="d45f46bd5a2ea13b4811caadf09709840d6548a36bb0079b36c8ac9fdf90c435a24834a8f6e36bf85a980c569b193446b0ca3d00000000000000000049412e082dc570c03adac4da5c10fa6c4b634c00181f9edc62e84a75524b292413d0750e6ec93e8f4643aef2603d4a0b3798162ea500"/128, @ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000028006000e004e23000005000d0000000000060002004e21000006000f00403a000008000800dd0000000800098000000000000000000900000014000100ff0000000000000000000000000000010800050005000000600003801400060000000000000000000000ffffffffffff0800010002000000060007004e2400001400020076657468305f74"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) dup(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000002c0)=@req={0x3ff, 0x1, 0x4, 0x9}, 0x10) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0xa10000, 0x4f6, 0x8, r4, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9}, 0x16) [ 298.389822][ T17] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 298.418615][ T17] ftdi_sio ttyUSB0: Unable to write latency timer: -71 09:27:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 298.452283][ T17] ftdi_sio 4-1:0.0: GPIO initialisation failed: -71 [ 298.478505][ T36] audit: type=1326 audit(1608024477.771:30): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13258 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:57 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 298.506068][ T17] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 298.562381][ T17] usb 4-1: USB disconnect, device number 8 [ 298.621561][ T17] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 09:27:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) [ 298.666081][ T17] ftdi_sio 4-1:0.0: device disconnected 09:27:58 executing program 0: socketpair(0xa, 0x3, 0x1f, &(0x7f0000000080)) 09:27:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:27:58 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:58 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x9}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x40000004}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88d1}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="d45f46bd5a2ea13b4811caadf09709840d6548a36bb0079b36c8ac9fdf90c435a24834a8f6e36bf85a980c569b193446b0ca3d00000000000000000049412e082dc570c03adac4da5c10fa6c4b634c00181f9edc62e84a75524b292413d0750e6ec93e8f4643aef2603d4a0b3798162ea500"/128, @ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000028006000e004e23000005000d0000000000060002004e21000006000f00403a000008000800dd0000000800098000000000000000000900000014000100ff0000000000000000000000000000010800050005000000600003801400060000000000000000000000ffffffffffff0800010002000000060007004e2400001400020076657468305f74"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) dup(0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0xa10000, 0x4f6, 0x8, r4, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB=','], 0x28}}, 0x0) 09:27:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:27:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x3, 0x4) 09:27:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:27:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 299.568355][ T36] audit: type=1326 audit(1608024478.861:31): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13322 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:27:59 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000100)=""/170, 0xaa) read$char_usb(r0, &(0x7f00000002c0)=""/211, 0xd3) 09:27:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:27:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x9}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x40000004}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88d1}, 0x8800) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="d45f46bd5a2ea13b4811caadf09709840d6548a36bb0079b36c8ac9fdf90c435a24834a8f6e36bf85a980c569b193446b0ca3d00000000000000000049412e082dc570c03adac4da5c10fa6c4b634c00181f9edc62e84a75524b292413d0750e6ec93e8f4643aef2603d4a0b3798162ea500"/128, @ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000028006000e004e23000005000d0000000000060002004e21000006000f00403a000008000800dd0000000800098000000000000000000900000014000100ff0000000000000000000000000000010800050005000000600003801400060000000000000000000000ffffffffffff0800010002000000060007004e2400001400020076657468305f74"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) dup(0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0xa10000, 0x4f6, 0x8, r4, 0x0, &(0x7f00000003c0)={0x9c0905, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:27:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:59 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000100)=""/170, 0xaa) read$char_usb(r0, &(0x7f00000002c0)=""/211, 0xd3) 09:27:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:27:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:27:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:27:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:27:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:27:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0xc090) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', 0x0, 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x8) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x3, 0x0) 09:28:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:28:00 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:00 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 301.285192][T13425] fuse: Bad value for 'fd' 09:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0xc090) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', 0x0, 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x8) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x3, 0x0) 09:28:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:28:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:00 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x46, @loopback}], 0x1c) 09:28:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) [ 301.624230][T13451] fuse: Bad value for 'fd' 09:28:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@private1, @private2, @local, 0x0, 0x0, 0x6}) 09:28:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 09:28:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) [ 301.892064][T13476] fuse: Bad value for 'fd' 09:28:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:01 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 09:28:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) setuid(0xffffffffffffffff) 09:28:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:01 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:01 executing program 3: bpf$MAP_CREATE(0x9, 0x0, 0x10) 09:28:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 09:28:01 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000400)={0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x0, 0x52, [], @p_u16=&(0x7f0000000380)=0x800}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:28:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 09:28:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) [ 302.620697][ T36] audit: type=1326 audit(1608024481.921:32): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13523 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:02 executing program 3: socketpair(0x2, 0x3, 0xfd, &(0x7f0000000080)) 09:28:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 09:28:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:02 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)) 09:28:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x46, @loopback}], 0x1c) 09:28:02 executing program 3: bpf$MAP_CREATE(0xa, &(0x7f0000000080)={0x9}, 0x16) 09:28:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x46, @loopback}], 0x1c) [ 303.595321][ T36] audit: type=1326 audit(1608024482.891:33): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13574 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:03 executing program 3: bpf$MAP_CREATE(0xa, 0x0, 0x0) 09:28:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x46, @loopback}], 0x1c) 09:28:03 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x9d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201010202d61d202505a1a44000010203010902"], &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000280)=@lang_id={0x4}}, {0x81, &(0x7f0000000b40)=@string={0x81, 0x3, "17e980ea6a9dddf7b41daf117229f4e92ad04002f6d51668266d995dcd2713b5e3991714ae19328c100b1c4a1a84290eed7bebd24a09054d35294613b6aab505c1c7c39945b6a308a605f1d17962ef6a4943c0fced63acf6e361f35aa5e0e19e33e1e0397a3ad062fc03fe5ace51ed32c5ff57f008fa7ea07c2b63dba28df4"}}]}) 09:28:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 304.546856][ T36] audit: type=1326 audit(1608024483.841:34): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13613 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 304.749684][ T9934] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 304.999999][ T9934] usb 4-1: Using ep0 maxpacket: 32 [ 305.180278][ T9934] usb 4-1: unable to get BOS descriptor or descriptor too short 09:28:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:04 executing program 2: socketpair(0x26, 0x5, 0x109, &(0x7f0000000040)) [ 305.280071][ T9934] usb 4-1: config 0 has no interfaces? [ 305.413940][T13648] fuse: Bad value for 'fd' [ 305.460325][ T9934] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 305.469418][ T9934] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 305.531390][ T9934] usb 4-1: Product: syz [ 305.536234][ T9934] usb 4-1: Manufacturer: 鵪ᶴᆯ⥲퀪ɀ헶栖洦嶙⟍딓駣ᐗ᦮谲ଐ䨜萚ษ篭틫ॊ䴅⤵ፆꪶֵ쟁駃뙅ࢣ֦퇱批櫯䍉ﳀ揭懣嫳黡㧠㩺拐ϼ嫾凎㋭ᅤ行ꁾ⭼趢 [ 305.589695][ T9934] usb 4-1: SerialNumber: syz [ 305.609252][ T9934] usb 4-1: config 0 descriptor?? [ 305.857542][ T17] usb 4-1: USB disconnect, device number 9 [ 306.629751][ T17] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 306.879797][ T17] usb 4-1: Using ep0 maxpacket: 32 [ 307.049948][ T17] usb 4-1: unable to get BOS descriptor or descriptor too short [ 307.131723][ T17] usb 4-1: config 0 has no interfaces? 09:28:06 executing program 3: socket(0x29, 0x2, 0xd) 09:28:06 executing program 2: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x80) 09:28:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 307.289899][ T17] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 307.289916][ T17] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 307.289927][ T17] usb 4-1: Product: syz [ 307.289943][ T17] usb 4-1: Manufacturer: 鵪ᶴᆯ⥲퀪ɀ헶栖洦嶙⟍딓駣ᐗ᦮谲ଐ䨜萚ษ篭틫ॊ䴅⤵ፆꪶֵ쟁駃뙅ࢣ֦퇱批櫯䍉ﳀ揭懣嫳黡㧠㩺拐ϼ嫾凎㋭ᅤ行ꁾ⭼趢 [ 307.289954][ T17] usb 4-1: SerialNumber: syz [ 307.292068][ T17] usb 4-1: config 0 descriptor?? [ 307.423623][ T7] usb 4-1: USB disconnect, device number 10 09:28:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:06 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:28:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:06 executing program 3: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x57) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) 09:28:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 307.499340][ T36] audit: type=1326 audit(1608024486.791:35): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13676 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 307.525641][T13685] fuse: Bad value for 'fd' 09:28:07 executing program 3: socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) 09:28:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 307.799520][T13704] fuse: Bad value for 'fd' 09:28:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 307.888770][T13708] fuse: Bad value for 'fd' [ 308.090034][T13714] fuse: Invalid rootmode 09:28:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:07 executing program 3: socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) 09:28:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:07 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:28:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:07 executing program 3: socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) [ 308.412887][T13731] fuse: Invalid rootmode [ 308.423518][T13733] fuse: Bad value for 'fd' 09:28:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 09:28:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 308.458433][ T36] audit: type=1326 audit(1608024487.751:36): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13729 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:08 executing program 3: socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) [ 308.688408][T13743] fuse: Invalid rootmode [ 308.743785][T13745] fuse: Bad value for 'fd' [ 308.872709][ T36] audit: type=1326 audit(1608024488.171:37): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13746 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(0x0, 0x0) 09:28:08 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xae441) 09:28:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:08 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_dev$vcsa(0x0, 0x4, 0x12000) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYRES16, @ANYBLOB="08002bbd7000fbdbdf250a000000080006000900000020000380140002006d61637674617030000000000000000005000800020000001c0003800800030003000000080005007f00000108000300000000005000"], 0x12c}, 0x1, 0x0, 0x0, 0x4800}, 0x4008041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x11300, 0x7) 09:28:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(0x0, 0x0) 09:28:08 executing program 3: syz_open_dev$dri(0x0, 0x1, 0xae441) 09:28:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 309.409522][ T36] audit: type=1326 audit(1608024488.691:38): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13766 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:08 executing program 3: syz_open_dev$dri(0x0, 0x1, 0xae441) 09:28:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(0x0, 0x0) 09:28:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 309.813754][ T36] audit: type=1326 audit(1608024489.111:39): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13789 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:09 executing program 3: syz_open_dev$dri(0x0, 0x1, 0xae441) 09:28:09 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x9}, 0x16) 09:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="eb970e6d6c967e354f86f21572b457e04c5a1d28f41ee1e4c127bd8ae16e44b919cc55a6d5cb2d43bd", @ANYRES16=0x0, @ANYBLOB="4ae8bca89f0003b73c020000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x2, 0x404441) socket$inet(0x2, 0x4000000000000001, 0x8) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, 0xc) 09:28:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:09 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0xae441) 09:28:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x40001, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:28:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:09 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0xae441) 09:28:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 09:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = io_uring_setup(0x196, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="eb970e6d6c967e354f86f21572b457e04c5a1d28f41ee1e4c127bd8ae16e44b919cc55a6d5cb2d43bd", @ANYRES16=0x0, @ANYBLOB="4ae8bca89f0003b73c020000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) dup2(r0, r2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x2, 0x404441) socket$inet(0x2, 0x4000000000000001, 0x8) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, 0xc) 09:28:09 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0xae441) 09:28:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:28:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(0x0, &(0x7f0000000140)) 09:28:10 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) 09:28:10 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2c6) splice(r0, 0x0, r4, 0x0, 0x883717, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 09:28:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:10 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 310.806505][ T36] audit: type=1326 audit(1608024490.101:40): auid=0 uid=0 gid=0 ses=4 subj=_ pid=13856 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:28:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(0x0, &(0x7f0000000140)) 09:28:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:10 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) 09:28:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:10 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2d0400, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 09:28:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(0x0, &(0x7f0000000140)) 09:28:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:11 executing program 5: perf_event_open(&(0x7f0000000640)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000080)) 09:28:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) 09:28:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @local}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@private1}, 0x0, @in6=@private0}}, 0xe8) 09:28:11 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) 09:28:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') 09:28:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) 09:28:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 09:28:11 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) 09:28:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 311.993229][T13917] fuse: Bad value for 'fd' 09:28:11 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50}, 0xffffff9d) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') unlink(&(0x7f0000000180)='./file2\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) 09:28:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(0x0, &(0x7f0000000080)) 09:28:11 executing program 2: add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 09:28:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) 09:28:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000220001"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@polexpire={0xc0, 0x1b, 0x221, 0x0, 0x0, {{{@in6=@local}}}}, 0xc0}, 0x8}, 0x0) 09:28:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(0x0, &(0x7f0000000080)) 09:28:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 312.216868][T13937] fuse: Bad value for 'fd' 09:28:11 executing program 2: getresgid(&(0x7f0000009700), &(0x7f0000009740), &(0x7f0000009780)) 09:28:11 executing program 1: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50}, 0xffffff9d) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1\x00') setxattr$security_ima(&(0x7f0000000080)='./file2\x00', 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 09:28:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000001200)={0x2, 0x4e21, @multicast2}, 0x10) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="1102962a3b814a508870092479bd5f", 0x1, 0x8000, 0x0, 0x59) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) recvfrom$inet(r0, &(0x7f0000000200)=""/4084, 0xff4, 0x62, 0x0, 0x0) [ 312.364120][T13945] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 09:28:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(0x0, &(0x7f0000000080)) 09:28:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 312.444128][T13952] fuse: Bad value for 'fd' [ 312.699466][T13967] fuse: Invalid rootmode 09:28:12 executing program 5: sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) 09:28:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002480)=ANY=[@ANYBLOB="d00800002400ffff01009e000000000000000000", @ANYRES32, @ANYBLOB="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"], 0x8d0}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 09:28:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 09:28:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000001200)={0x2, 0x4e21, @multicast2}, 0x10) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="1102962a3b814a508870092479bd5f", 0x1, 0x8000, 0x0, 0x59) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) recvfrom$inet(r0, &(0x7f0000000200)=""/4084, 0xff4, 0x62, 0x0, 0x0) 09:28:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:28:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 09:28:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000001200)={0x2, 0x4e21, @multicast2}, 0x10) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="1102962a3b814a508870092479bd5f", 0x1, 0x8000, 0x0, 0x59) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) recvfrom$inet(r0, &(0x7f0000000200)=""/4084, 0xff4, 0x62, 0x0, 0x0) [ 313.450619][T13985] fuse: Invalid rootmode [ 313.720296][T13999] fuse: Invalid rootmode 09:28:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c0005020000000087de1dd00a000000", @ANYRES32=r5, @ANYBLOB="00000a00140001"], 0x30}}, 0x0) 09:28:13 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0x238, 0x238, 0x140, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "581f"}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@socket2={{0x28, 'socket\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'gre0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 09:28:13 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 09:28:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000001200)={0x2, 0x4e21, @multicast2}, 0x10) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="1102962a3b814a508870092479bd5f", 0x1, 0x8000, 0x0, 0x59) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) recvfrom$inet(r0, &(0x7f0000000200)=""/4084, 0xff4, 0x62, 0x0, 0x0) 09:28:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, 0x0, 0x0) 09:28:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 09:28:13 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d93be1", 0x18, 0x3a, 0xff, @dev, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0xff, [], @dev}}}}}}, 0x0) 09:28:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00ff2de45e810d99328a040bd8f121bc385c06dbb6"], 0x1c}}, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) 09:28:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000100)={'sit0\x00', 0x0}) 09:28:13 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd8c64dee7af508d, @perf_bp={0x0}, 0x2000201ac, 0x3e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffc9d) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) mount(0x0, &(0x7f0000000600)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x1, &(0x7f0000000000)) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080)='net_prio.ifpriomap\x00', 0x2, 0x0) 09:28:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, 0x0, 0x0) 09:28:13 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d93be1", 0x18, 0x3a, 0xff, @dev, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0xff, [], @dev}}}}}}, 0x0) [ 314.066160][T14017] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 314.129324][T14025] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 09:28:13 executing program 1: r0 = epoll_create(0x3) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 09:28:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fspick(0xffffffffffffff9c, 0x0, 0x0) 09:28:13 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd8c64dee7af508d, @perf_bp={0x0}, 0x2000201ac, 0x3e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffc9d) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, 0x0) ioctl$CHAR_RAW_DISCARD(0xffffffffffffffff, 0x1277, 0x0) mount(0x0, &(0x7f0000000600)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, 0x0, 0x2, 0x0) 09:28:13 executing program 5: request_key(&(0x7f0000000480)='syzkaller\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)='memory.swap.current\x00', 0xfffffffffffffffb) 09:28:13 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x144000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x8000, &(0x7f0000000080)) [ 314.227602][T14035] NFS: Device name not specified [ 314.247531][T14045] NFS: Device name not specified 09:28:13 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d93be1", 0x18, 0x3a, 0xff, @dev, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0xff, [], @dev}}}}}}, 0x0) 09:28:13 executing program 4: socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) [ 314.379262][T14053] NFS: Device name not specified 09:28:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="070000000000000000a07400000000000000ef"]}) 09:28:13 executing program 3: socket(0x2, 0xa, 0x80) [ 314.403045][T14053] NFS: Device name not specified 09:28:13 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x5d, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000000706ffff010000001200041d0022a2260c00010006"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x248002, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 09:28:13 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d93be1", 0x18, 0x3a, 0xff, @dev, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0xff, [], @dev}}}}}}, 0x0) [ 314.483123][ T36] audit: type=1326 audit(1608024493.781:41): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 09:28:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x800900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x388, 0x0, 0x0, 0x200, 0x1e8, 0x0, 0x2b8, 0x2e8, 0x2e8, 0x2b8, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x1e8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "cfcaf80c672f61cd17ae5119b5135c2aee000100005cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea3350300d000002061c96baebc975f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x1, 0x2}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'virt_wifi0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1eb) 09:28:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x1) [ 314.562097][ T36] audit: type=1326 audit(1608024493.801:42): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 09:28:14 executing program 0: r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 09:28:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x1000000003, 0x2) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 09:28:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x80}}, 0x1c}}, 0x0) [ 314.711880][ T36] audit: type=1326 audit(1608024493.801:43): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 314.750556][T14085] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 09:28:14 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)) [ 314.775726][T14085] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 314.791411][T14085] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 314.804964][ T36] audit: type=1326 audit(1608024493.801:44): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=53 compat=0 ip=0x45e159 code=0x7ffc0000 [ 314.826151][T14088] xt_hashlimit: overflow, try lower: 0/0 09:28:14 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)) 09:28:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}]}, 0x24}}, 0x0) [ 314.868869][ T36] audit: type=1326 audit(1608024493.801:45): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 09:28:14 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff, 0x98cc2) 09:28:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) [ 314.981222][ T36] audit: type=1326 audit(1608024493.801:46): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 [ 315.015926][ T36] audit: type=1326 audit(1608024493.801:47): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 315.112057][ T36] audit: type=1326 audit(1608024493.801:48): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=32 compat=0 ip=0x45e159 code=0x7ffc0000 [ 315.206639][ T36] audit: type=1326 audit(1608024493.801:49): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 315.245282][ T36] audit: type=1326 audit(1608024493.801:50): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 09:28:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x4, [@var, @enum={0x0, 0x8, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}, @array]}, {0x0, [0x0, 0x0]}}, 0x0, 0xd4}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:28:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'vlan0\x00'}) 09:28:14 executing program 0: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000001c0)=0xf9, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a016c0060004003002cfff57b016d2763bd56373780398d530000000000000003c92ad462218d9045a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49770afd6e9ef5837dbd00000000c000"/108, 0x3287, 0x42, 0x0, 0x331) 09:28:14 executing program 5: r0 = memfd_create(&(0x7f0000000f00)='\x03\x11&\xe8\\\x19\xd8\x87o\x8f\xf4\"\x88\xe4^\x05\xd2\xd7\xa8\x9a1{-\xbf!\xd9\xfe\xce\x85\xd6\x9cY\xf4o\xef\x90\xcf\xce\xe7\xfa\xce\xb0\xa02\x19\x93\x1a%CZ\xca\x81\x00\\\x1d\x1c)42\xb2\xdd\xd1\x87|\xe1X\x1aby\xedo\xa2+z\xf6i$\x84s\xd2e\x05\x00\xd1g\xc0\x8c8,TQ\xa8Bz\x96:\xdaq/\xd1\x98\x93\xaf7\x17\xfa\x10\x99\x87\xce\xd5Q\xab;OOPr:i\xd2\xb3-i\x00\xbc\x19M\"\xd5s\x85\xa7Bo|\x95\xd0\xbc\xbc-\x80lS\t-H\x86Y\xe2\xde\xd4K\\\x1dF\x87b\xf2y=\f\x12\x8aw\xfc\x17\xa69/w\xeaH\x80\x90.\xf4\xbf:\x95!RO\x0f\xf3\x02\x01\xa0)\vL/\x81Zo\x0e\v<\xf1_\xd3\xde\x0eB\x01\x8f~\x1f\\@D\xa374z\xaf\xad\xb2=7\xfc\x8b\x1a\x8b\x15\xc0\xfc2\x0eIIv\xc9f\x8b\xc5M\xaf\xdf#H\x02\xc6\xa0\x92\x80\x14:\xa9\x82\a\xc6+Z\xea\xa4m\xabL\xb1\x15)\xd4<\xe5\xe4x&\x84\xa3\n\xca\xaey\x87\xf5\xb3<\x8c\xeb\xbe0\xe9\xe7\xbau\x9b\xf5\xcb\xc8\xfb\x97\xcaI\x7f\x85_\xa5\xe0J,\xa0\xef\xe7\xe2\x96\xba\a\xb8\x19\x9d\xd4\xf6\xe7\"\xea7\x06\xa7o\xadB\x05\xdb\x11\xc7\xbcM\xab2\x87\xa8F\x19p\xeb#a;g\x8cyn\xfb3\x95x\xee7\xf7\x02Q$\xfc\x86\xd4\x8cy\x0f\x1b\x1e\xb5\xcf\xd4\xa9\xba\xe4L\xf9\xee\xb3;TP:,\xa8*Z,Du\a\x99\xfb*\x9d\x9a\xed\xd4t\xf4\xad\xf8\x8dj\xfd\xe2\x1e)3>.;\xf8\x16\xed\xdbJ\xd1\x84K\xe6(j\xcb\x93\b\x00]\x82\x85\x0f\xac\xf3\x12}pi\x0f\xe2d\x9e\x0f\\\n\b\x19\x8c!\xc1b\x1c\x15\x89\x1e\x87\xd0\xd6\xef\x05,WI\xce]\xdc\xb3N;:\xd3\xe3\xe3\x02\xc8\xf1\xa6\x92\x06S\x81\xc2\x99\x9eU\xd3\x15R\x1d\a \x0e\x12f\x04\x83?\x96\x18s\x80xw\x99\xcb\x87\x1dj+mp\x18|\xbe;\x12\'y\xc1\x17\xda\x8eb\'\xbel\xe4\xe3\xdaM\a\"|\xe3\xbd|LRk\x01\x1a\x17\x81\xe2\x87k\xe8\xf2\x90\xb4\xe8\xf2\xb3V\x15\xce\xc8NqRJ\x05\xd6tm\xff\b@\xb4\x05\x93\xc7\xcf\xb7M\x13\x96_m0|\x9f\x93\xd6\xe6\xd1\xaa\x1b1\xed\xbfAzI\xb5\xbf\x02\xe59\xb2\xb4\xed\x1a\xab\xe2\x1eS\xd5N0\x9c\x00\xd66fD\xd4\xcbO2v\xa0\xa4\xc8\xf2\\\xee\xa0\xcc\xbf9\xe1\xad\x82\x86\x83\xe7\xac\xaf\xdc\xb5\x04\x80\xe4k\x9dZ\x92i\xa7P\x8b\xe7\x03q.\xff?\xa3\x1e\x97\x9cW\x17ipm>(\x8d\xf8\xf9\xa4\xb4.\x0f\xaeM\x9c\x99\x81\x14\xbf\xbb\xae\xc2:\x1f1\x95%\x96\x86Y\xa8\xab\x85Y)\x85v\x1e\xe9B\xc2IF/9\xa4B\xec\xcc\x9e\xd1\xf8\xeaN\x01\xe0t$SW\xe1\x15\xe5\x1c\xb3,-\x98\xdb\x97\xbc\xf0\xf8[&\x8f\x11\x9fV\x113x\xad\x93\xb8\x87fm\x16\xba\'4\xb9\xaa\x1e\x96p?i\xb4\x98Siym#\x80po\xe9\x87\xde\xb0\x1d\xe3\x01\xe9\xd4\x19\x9b)\xe5ur\x00', 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001280)={0x0, "871ea92393fb128a766b871239d4f9b1"}) clone(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 09:28:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@getrule={0x14, 0x22, 0x701}, 0x14}}, 0x0) 09:28:14 executing program 4: socket(0x1, 0x0, 0x132e) 09:28:14 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='fdinfo/3\x00') 09:28:14 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') 09:28:14 executing program 0: write$char_raw(0xffffffffffffffff, &(0x7f0000000200)={"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"}, 0x9000) getresgid(&(0x7f0000009700), &(0x7f0000009740), &(0x7f0000009780)) 09:28:15 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0) 09:28:15 executing program 5: r0 = memfd_create(&(0x7f0000000f00)='\x03\x11&\xe8\\\x19\xd8\x87o\x8f\xf4\"\x88\xe4^\x05\xd2\xd7\xa8\x9a1{-\xbf!\xd9\xfe\xce\x85\xd6\x9cY\xf4o\xef\x90\xcf\xce\xe7\xfa\xce\xb0\xa02\x19\x93\x1a%CZ\xca\x81\x00\\\x1d\x1c)42\xb2\xdd\xd1\x87|\xe1X\x1aby\xedo\xa2+z\xf6i$\x84s\xd2e\x05\x00\xd1g\xc0\x8c8,TQ\xa8Bz\x96:\xdaq/\xd1\x98\x93\xaf7\x17\xfa\x10\x99\x87\xce\xd5Q\xab;OOPr:i\xd2\xb3-i\x00\xbc\x19M\"\xd5s\x85\xa7Bo|\x95\xd0\xbc\xbc-\x80lS\t-H\x86Y\xe2\xde\xd4K\\\x1dF\x87b\xf2y=\f\x12\x8aw\xfc\x17\xa69/w\xeaH\x80\x90.\xf4\xbf:\x95!RO\x0f\xf3\x02\x01\xa0)\vL/\x81Zo\x0e\v<\xf1_\xd3\xde\x0eB\x01\x8f~\x1f\\@D\xa374z\xaf\xad\xb2=7\xfc\x8b\x1a\x8b\x15\xc0\xfc2\x0eIIv\xc9f\x8b\xc5M\xaf\xdf#H\x02\xc6\xa0\x92\x80\x14:\xa9\x82\a\xc6+Z\xea\xa4m\xabL\xb1\x15)\xd4<\xe5\xe4x&\x84\xa3\n\xca\xaey\x87\xf5\xb3<\x8c\xeb\xbe0\xe9\xe7\xbau\x9b\xf5\xcb\xc8\xfb\x97\xcaI\x7f\x85_\xa5\xe0J,\xa0\xef\xe7\xe2\x96\xba\a\xb8\x19\x9d\xd4\xf6\xe7\"\xea7\x06\xa7o\xadB\x05\xdb\x11\xc7\xbcM\xab2\x87\xa8F\x19p\xeb#a;g\x8cyn\xfb3\x95x\xee7\xf7\x02Q$\xfc\x86\xd4\x8cy\x0f\x1b\x1e\xb5\xcf\xd4\xa9\xba\xe4L\xf9\xee\xb3;TP:,\xa8*Z,Du\a\x99\xfb*\x9d\x9a\xed\xd4t\xf4\xad\xf8\x8dj\xfd\xe2\x1e)3>.;\xf8\x16\xed\xdbJ\xd1\x84K\xe6(j\xcb\x93\b\x00]\x82\x85\x0f\xac\xf3\x12}pi\x0f\xe2d\x9e\x0f\\\n\b\x19\x8c!\xc1b\x1c\x15\x89\x1e\x87\xd0\xd6\xef\x05,WI\xce]\xdc\xb3N;:\xd3\xe3\xe3\x02\xc8\xf1\xa6\x92\x06S\x81\xc2\x99\x9eU\xd3\x15R\x1d\a \x0e\x12f\x04\x83?\x96\x18s\x80xw\x99\xcb\x87\x1dj+mp\x18|\xbe;\x12\'y\xc1\x17\xda\x8eb\'\xbel\xe4\xe3\xdaM\a\"|\xe3\xbd|LRk\x01\x1a\x17\x81\xe2\x87k\xe8\xf2\x90\xb4\xe8\xf2\xb3V\x15\xce\xc8NqRJ\x05\xd6tm\xff\b@\xb4\x05\x93\xc7\xcf\xb7M\x13\x96_m0|\x9f\x93\xd6\xe6\xd1\xaa\x1b1\xed\xbfAzI\xb5\xbf\x02\xe59\xb2\xb4\xed\x1a\xab\xe2\x1eS\xd5N0\x9c\x00\xd66fD\xd4\xcbO2v\xa0\xa4\xc8\xf2\\\xee\xa0\xcc\xbf9\xe1\xad\x82\x86\x83\xe7\xac\xaf\xdc\xb5\x04\x80\xe4k\x9dZ\x92i\xa7P\x8b\xe7\x03q.\xff?\xa3\x1e\x97\x9cW\x17ipm>(\x8d\xf8\xf9\xa4\xb4.\x0f\xaeM\x9c\x99\x81\x14\xbf\xbb\xae\xc2:\x1f1\x95%\x96\x86Y\xa8\xab\x85Y)\x85v\x1e\xe9B\xc2IF/9\xa4B\xec\xcc\x9e\xd1\xf8\xeaN\x01\xe0t$SW\xe1\x15\xe5\x1c\xb3,-\x98\xdb\x97\xbc\xf0\xf8[&\x8f\x11\x9fV\x113x\xad\x93\xb8\x87fm\x16\xba\'4\xb9\xaa\x1e\x96p?i\xb4\x98Siym#\x80po\xe9\x87\xde\xb0\x1d\xe3\x01\xe9\xd4\x19\x9b)\xe5ur\x00', 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001280)={0x0, "871ea92393fb128a766b871239d4f9b1"}) clone(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 09:28:15 executing program 3: r0 = memfd_create(&(0x7f0000000f00)='\x03\x11&\xe8\\\x19\xd8\x87o\x8f\xf4\"\x88\xe4^\x05\xd2\xd7\xa8\x9a1{-\xbf!\xd9\xfe\xce\x85\xd6\x9cY\xf4o\xef\x90\xcf\xce\xe7\xfa\xce\xb0\xa02\x19\x93\x1a%CZ\xca\x81\x00\\\x1d\x1c)42\xb2\xdd\xd1\x87|\xe1X\x1aby\xedo\xa2+z\xf6i$\x84s\xd2e\x05\x00\xd1g\xc0\x8c8,TQ\xa8Bz\x96:\xdaq/\xd1\x98\x93\xaf7\x17\xfa\x10\x99\x87\xce\xd5Q\xab;OOPr:i\xd2\xb3-i\x00\xbc\x19M\"\xd5s\x85\xa7Bo|\x95\xd0\xbc\xbc-\x80lS\t-H\x86Y\xe2\xde\xd4K\\\x1dF\x87b\xf2y=\f\x12\x8aw\xfc\x17\xa69/w\xeaH\x80\x90.\xf4\xbf:\x95!RO\x0f\xf3\x02\x01\xa0)\vL/\x81Zo\x0e\v<\xf1_\xd3\xde\x0eB\x01\x8f~\x1f\\@D\xa374z\xaf\xad\xb2=7\xfc\x8b\x1a\x8b\x15\xc0\xfc2\x0eIIv\xc9f\x8b\xc5M\xaf\xdf#H\x02\xc6\xa0\x92\x80\x14:\xa9\x82\a\xc6+Z\xea\xa4m\xabL\xb1\x15)\xd4<\xe5\xe4x&\x84\xa3\n\xca\xaey\x87\xf5\xb3<\x8c\xeb\xbe0\xe9\xe7\xbau\x9b\xf5\xcb\xc8\xfb\x97\xcaI\x7f\x85_\xa5\xe0J,\xa0\xef\xe7\xe2\x96\xba\a\xb8\x19\x9d\xd4\xf6\xe7\"\xea7\x06\xa7o\xadB\x05\xdb\x11\xc7\xbcM\xab2\x87\xa8F\x19p\xeb#a;g\x8cyn\xfb3\x95x\xee7\xf7\x02Q$\xfc\x86\xd4\x8cy\x0f\x1b\x1e\xb5\xcf\xd4\xa9\xba\xe4L\xf9\xee\xb3;TP:,\xa8*Z,Du\a\x99\xfb*\x9d\x9a\xed\xd4t\xf4\xad\xf8\x8dj\xfd\xe2\x1e)3>.;\xf8\x16\xed\xdbJ\xd1\x84K\xe6(j\xcb\x93\b\x00]\x82\x85\x0f\xac\xf3\x12}pi\x0f\xe2d\x9e\x0f\\\n\b\x19\x8c!\xc1b\x1c\x15\x89\x1e\x87\xd0\xd6\xef\x05,WI\xce]\xdc\xb3N;:\xd3\xe3\xe3\x02\xc8\xf1\xa6\x92\x06S\x81\xc2\x99\x9eU\xd3\x15R\x1d\a \x0e\x12f\x04\x83?\x96\x18s\x80xw\x99\xcb\x87\x1dj+mp\x18|\xbe;\x12\'y\xc1\x17\xda\x8eb\'\xbel\xe4\xe3\xdaM\a\"|\xe3\xbd|LRk\x01\x1a\x17\x81\xe2\x87k\xe8\xf2\x90\xb4\xe8\xf2\xb3V\x15\xce\xc8NqRJ\x05\xd6tm\xff\b@\xb4\x05\x93\xc7\xcf\xb7M\x13\x96_m0|\x9f\x93\xd6\xe6\xd1\xaa\x1b1\xed\xbfAzI\xb5\xbf\x02\xe59\xb2\xb4\xed\x1a\xab\xe2\x1eS\xd5N0\x9c\x00\xd66fD\xd4\xcbO2v\xa0\xa4\xc8\xf2\\\xee\xa0\xcc\xbf9\xe1\xad\x82\x86\x83\xe7\xac\xaf\xdc\xb5\x04\x80\xe4k\x9dZ\x92i\xa7P\x8b\xe7\x03q.\xff?\xa3\x1e\x97\x9cW\x17ipm>(\x8d\xf8\xf9\xa4\xb4.\x0f\xaeM\x9c\x99\x81\x14\xbf\xbb\xae\xc2:\x1f1\x95%\x96\x86Y\xa8\xab\x85Y)\x85v\x1e\xe9B\xc2IF/9\xa4B\xec\xcc\x9e\xd1\xf8\xeaN\x01\xe0t$SW\xe1\x15\xe5\x1c\xb3,-\x98\xdb\x97\xbc\xf0\xf8[&\x8f\x11\x9fV\x113x\xad\x93\xb8\x87fm\x16\xba\'4\xb9\xaa\x1e\x96p?i\xb4\x98Siym#\x80po\xe9\x87\xde\xb0\x1d\xe3\x01\xe9\xd4\x19\x9b)\xe5ur\x00', 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001280)={0x0, "871ea92393fb128a766b871239d4f9b1"}) clone(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) [ 315.946893][T14157] [ 315.949442][T14157] ============================================ [ 315.955885][T14157] WARNING: possible recursive locking detected [ 315.962464][T14157] 5.10.0-syzkaller #0 Not tainted [ 315.967726][T14157] -------------------------------------------- [ 315.974039][T14157] syz-executor.5/14157 is trying to acquire lock: [ 315.980475][T14157] ffff888024180358 (&hugetlbfs_i_mmap_rwsem_key){++++}-{3:3}, at: hugetlb_cow+0x751/0x1bc0 [ 315.990781][T14157] [ 315.990781][T14157] but task is already holding lock: [ 315.998163][T14157] ffff888024180358 (&hugetlbfs_i_mmap_rwsem_key){++++}-{3:3}, at: hugetlb_fault+0x31e/0x1280 [ 316.008576][T14157] [ 316.008576][T14157] other info that might help us debug this: [ 316.016640][T14157] Possible unsafe locking scenario: [ 316.016640][T14157] [ 316.024332][T14157] CPU0 [ 316.027812][T14157] ---- [ 316.031096][T14157] lock(&hugetlbfs_i_mmap_rwsem_key); [ 316.036576][T14157] lock(&hugetlbfs_i_mmap_rwsem_key); [ 316.042103][T14157] [ 316.042103][T14157] *** DEADLOCK *** [ 316.042103][T14157] [ 316.050492][T14157] May be due to missing lock nesting notation [ 316.050492][T14157] [ 316.059175][T14157] 3 locks held by syz-executor.5/14157: [ 316.064815][T14157] #0: ffff888011fc9568 (&mm->mmap_lock#2){++++}-{3:3}, at: do_user_addr_fault+0x2a9/0xad0 [ 316.074830][T14157] #1: ffff888024180358 (&hugetlbfs_i_mmap_rwsem_key){++++}-{3:3}, at: hugetlb_fault+0x31e/0x1280 [ 316.085577][T14157] #2: ffff888014d100f8 (&hugetlb_fault_mutex_table[i]){+.+.}-{3:3}, at: hugetlb_fault+0x4a6/0x1280 [ 316.097074][T14157] [ 316.097074][T14157] stack backtrace: [ 316.103119][T14157] CPU: 1 PID: 14157 Comm: syz-executor.5 Not tainted 5.10.0-syzkaller #0 [ 316.111622][T14157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.121827][T14157] Call Trace: [ 316.125147][T14157] dump_stack+0x137/0x1be [ 316.129787][T14157] ? wake_up_klogd+0xb2/0xf0 [ 316.134382][T14157] __lock_acquire+0x2333/0x5e90 [ 316.139255][T14157] lock_acquire+0x114/0x5e0 [ 316.143773][T14157] ? hugetlb_cow+0x751/0x1bc0 [ 316.148473][T14157] down_write+0x56/0x120 [ 316.152857][T14157] ? hugetlb_cow+0x751/0x1bc0 [ 316.157542][T14157] hugetlb_cow+0x751/0x1bc0 [ 316.162067][T14157] ? do_raw_spin_lock+0xfe/0x800 [ 316.167017][T14157] hugetlb_fault+0xa4c/0x1280 [ 316.171931][T14157] handle_mm_fault+0x223c/0x25a0 [ 316.176903][T14157] ? vmacache_find+0x4ef/0x5d0 [ 316.181908][T14157] ? vmacache_update+0x9f/0xf0 [ 316.186965][T14157] do_user_addr_fault+0x50d/0xad0 [ 316.192007][T14157] exc_page_fault+0xa1/0x1e0 [ 316.196679][T14157] asm_exc_page_fault+0x1e/0x30 [ 316.201535][T14157] RIP: 0010:__put_user_nocheck_8+0x3/0x21 [ 316.207261][T14157] Code: 00 00 48 39 d9 73 34 0f 1f 00 89 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f 00 00 48 39 d9 73 14 0f 1f 00 <48> 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 0f 1f 00 b9 f2 ff ff ff [ 316.227102][T14157] RSP: 0018:ffffc90001cefb98 EFLAGS: 00010297 [ 316.233178][T14157] RAX: 00007fae279a19d0 RBX: 00007fffffffeff9 RCX: 0000000020000080 [ 316.241240][T14157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 316.249341][T14157] RBP: ffffc90001ceff38 R08: dffffc0000000000 R09: fffffbfff1a1cba6 [ 316.257395][T14157] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: 0000000000000000 [ 316.266089][T14157] R13: 0000000000000000 R14: 0000000000000027 R15: 00000000ffffffda [ 316.274186][T14157] __se_sys_prctl+0x2c2/0x2810 [ 316.278955][T14157] ? __lock_acquire+0x1351/0x5e90 [ 316.284237][T14157] ? __might_fault+0xb8/0x110 [ 316.288923][T14157] ? syscall_enter_from_user_mode+0x24/0x190 [ 316.295069][T14157] ? lockdep_hardirqs_on+0x8d/0x130 [ 316.300278][T14157] ? __x64_sys_prctl+0x1c/0xc0 [ 316.305051][T14157] do_syscall_64+0x2d/0x70 [ 316.309478][T14157] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.315376][T14157] RIP: 0033:0x45e159 [ 316.319336][T14157] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.339735][T14157] RSP: 002b:00007fae279a0c68 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 316.348426][T14157] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045e159 [ 316.356754][T14157] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000028 [ 316.364736][T14157] RBP: 000000000119bfb8 R08: 0000000000000000 R09: 0000000000000000 [ 316.372972][T14157] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 316.381197][T14157] R13: 00007fffc0982f9f R14: 00007fae279a19c0 R15: 000000000119bf8c [ 316.390025][ C1] ------------[ cut here ]------------ [ 316.395708][ C1] WARNING: CPU: 1 PID: 14157 at drivers/gpu/drm/vkms/vkms_crtc.c:21 vkms_vblank_simulate+0x2be/0x320 [ 316.406640][ C1] Modules linked in: [ 316.410755][ C1] CPU: 1 PID: 14157 Comm: syz-executor.5 Not tainted 5.10.0-syzkaller #0 [ 316.419210][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.429286][ C1] RIP: 0010:vkms_vblank_simulate+0x2be/0x320 [ 316.435439][ C1] Code: 00 00 00 48 c7 c6 40 69 26 8a 31 c0 e8 bb 72 ef ff b8 01 00 00 00 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 c2 94 1a fd <0f> 0b e9 eb fd ff ff 89 d9 80 e1 07 38 c1 0f 8c 5f fe ff ff 48 89 [ 316.455678][ C1] RSP: 0018:ffffc90000d90d78 EFLAGS: 00010046 [ 316.461887][ C1] RAX: ffffffff845ac71e RBX: 000000000000001a RCX: ffff88802cd29ac0 [ 316.470044][ C1] RDX: 0000000000010001 RSI: 000000000000001a RDI: 0000000000000001 [ 316.478210][ C1] RBP: ffff8880b9d26920 R08: ffffffff845ac501 R09: fffffbfff1a1cba6 [ 316.486362][ C1] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: dffffc0000000000 [ 316.494701][ C1] R13: 1ffff110173a4d1a R14: 0000000000fe4c00 R15: ffff888143948d40 [ 316.503197][ C1] FS: 00007fae279a1700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 316.512364][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 316.518952][ C1] CR2: 0000000020000080 CR3: 0000000018439000 CR4: 00000000001506e0 [ 316.527208][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 316.535279][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 316.543510][ C1] Call Trace: [ 316.547040][ C1] [ 316.550028][ C1] ? vkms_get_vblank_timestamp+0x210/0x210 [ 316.555837][ C1] __hrtimer_run_queues+0x48f/0x960 [ 316.561188][ C1] hrtimer_interrupt+0x3b3/0xe00 [ 316.566159][ C1] __sysvec_apic_timer_interrupt+0xf9/0x270 [ 316.572059][ C1] asm_call_irq_on_stack+0xf/0x20 [ 316.577220][ C1] [ 316.580161][ C1] sysvec_apic_timer_interrupt+0x9f/0xf0 [ 316.585824][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 316.592033][ C1] RIP: 0010:preempt_schedule_irq+0x7e/0x100 [ 316.597924][ C1] Code: 00 74 12 0f 0b 0f 1f 80 00 00 00 00 48 f7 03 08 00 00 00 74 75 bf 01 00 00 00 e8 7d 2a 0f f8 e8 78 ba 3a f8 fb bf 01 00 00 00 dd eb ff ff 9c 8f 04 24 43 80 3c 3c 00 74 08 4c 89 f7 e8 ba fd [ 316.617764][ C1] RSP: 0018:ffffc90001cef470 EFLAGS: 00000282 [ 316.623880][ C1] RAX: d818203e49877300 RBX: 0000000000000000 RCX: 0000000000040000 [ 316.631998][ C1] RDX: ffffc900137e5000 RSI: 000000000003ffff RDI: 0000000000000001 [ 316.640158][ C1] RBP: 0000000000000000 R08: ffffffff817b38a0 R09: fffffbfff1a1cba6 [ 316.648389][ C1] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: 1ffff9200039de8e [ 316.656684][ C1] R13: 0000000000000000 R14: ffffc90001cef470 R15: dffffc0000000000 [ 316.664810][ C1] ? trace_hardirqs_on+0x30/0x80 [ 316.669760][ C1] irqentry_exit+0xa7/0xb0 [ 316.674184][ C1] asm_sysvec_reschedule_ipi+0x12/0x20 [ 316.679734][ C1] RIP: 0010:lock_acquire+0x144/0x5e0 [ 316.685016][ C1] Code: c7 00 41 ae 89 e8 8c db e5 07 b8 ff ff ff ff 65 0f c1 05 5f e1 a8 7e 83 f8 01 0f 85 09 02 00 00 48 89 5c 24 18 ff 74 24 18 9d <65> 48 8b 04 25 28 00 00 00 48 3b 44 24 50 0f 85 32 04 00 00 48 83 [ 316.705467][ C1] RSP: 0018:ffffc90001cef560 EFLAGS: 00000246 [ 316.711689][ C1] RAX: 0000000000000001 RBX: 0000000000000246 RCX: 0000000000040000 [ 316.719769][ C1] RDX: ffffc900137e5000 RSI: 0000000000000000 RDI: 0000000000000000 [ 316.727870][ C1] RBP: 0000000000000000 R08: dffffc0000000000 R09: 0000000000000003 [ 316.735982][ C1] R10: fffffbfff1850c75 R11: 0000000000000004 R12: 0000000000000001 [ 316.744033][ C1] R13: 0000000000000000 R14: ffff88802cd2a444 R15: 0000000000000000 [ 316.752041][ C1] down_write+0x56/0x120 [ 316.756291][ C1] ? hugetlb_cow+0x751/0x1bc0 [ 316.761110][ C1] hugetlb_cow+0x751/0x1bc0 [ 316.765622][ C1] ? do_raw_spin_lock+0xfe/0x800 [ 316.770565][ C1] hugetlb_fault+0xa4c/0x1280 [ 316.775308][ C1] handle_mm_fault+0x223c/0x25a0 [ 316.780273][ C1] ? vmacache_find+0x4ef/0x5d0 [ 316.785038][ C1] ? vmacache_update+0x9f/0xf0 [ 316.789808][ C1] do_user_addr_fault+0x50d/0xad0 [ 316.794837][ C1] exc_page_fault+0xa1/0x1e0 [ 316.799522][ C1] asm_exc_page_fault+0x1e/0x30 [ 316.804373][ C1] RIP: 0010:__put_user_nocheck_8+0x3/0x21 [ 316.810090][ C1] Code: 00 00 48 39 d9 73 34 0f 1f 00 89 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f 00 00 48 39 d9 73 14 0f 1f 00 <48> 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 0f 1f 00 b9 f2 ff ff ff [ 316.829811][ C1] RSP: 0018:ffffc90001cefb98 EFLAGS: 00010297 [ 316.835992][ C1] RAX: 00007fae279a19d0 RBX: 00007fffffffeff9 RCX: 0000000020000080 [ 316.843966][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 316.852037][ C1] RBP: ffffc90001ceff38 R08: dffffc0000000000 R09: fffffbfff1a1cba6 [ 316.860010][ C1] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: 0000000000000000 [ 316.867988][ C1] R13: 0000000000000000 R14: 0000000000000027 R15: 00000000ffffffda [ 316.875977][ C1] __se_sys_prctl+0x2c2/0x2810 [ 316.880743][ C1] ? __lock_acquire+0x1351/0x5e90 [ 316.885835][ C1] ? __might_fault+0xb8/0x110 [ 316.890514][ C1] ? syscall_enter_from_user_mode+0x24/0x190 [ 316.896495][ C1] ? lockdep_hardirqs_on+0x8d/0x130 [ 316.901695][ C1] ? __x64_sys_prctl+0x1c/0xc0 [ 316.906461][ C1] do_syscall_64+0x2d/0x70 [ 316.910877][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.916761][ C1] RIP: 0033:0x45e159 [ 316.920650][ C1] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.940280][ C1] RSP: 002b:00007fae279a0c68 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 316.948686][ C1] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045e159 [ 316.956642][ C1] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000028 [ 316.964603][ C1] RBP: 000000000119bfb8 R08: 0000000000000000 R09: 0000000000000000 [ 316.972562][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 316.980544][ C1] R13: 00007fffc0982f9f R14: 00007fae279a19c0 R15: 000000000119bf8c [ 316.988520][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 316.995094][ C1] CPU: 1 PID: 14157 Comm: syz-executor.5 Not tainted 5.10.0-syzkaller #0 [ 317.004453][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.014490][ C1] Call Trace: [ 317.017757][ C1] [ 317.020597][ C1] dump_stack+0x137/0x1be [ 317.024910][ C1] ? panic+0x1f3/0x800 [ 317.028960][ C1] panic+0x291/0x800 [ 317.032842][ C1] ? __warn+0x13e/0x270 [ 317.036982][ C1] __warn+0x26a/0x270 [ 317.040967][ C1] ? vkms_vblank_simulate+0x2be/0x320 [ 317.046336][ C1] ? vkms_vblank_simulate+0x2be/0x320 [ 317.051780][ C1] report_bug+0x1b1/0x2e0 [ 317.056098][ C1] handle_bug+0x3d/0x70 [ 317.060235][ C1] exc_invalid_op+0x16/0x40 [ 317.064756][ C1] asm_exc_invalid_op+0x12/0x20 [ 317.069590][ C1] RIP: 0010:vkms_vblank_simulate+0x2be/0x320 [ 317.075554][ C1] Code: 00 00 00 48 c7 c6 40 69 26 8a 31 c0 e8 bb 72 ef ff b8 01 00 00 00 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 c2 94 1a fd <0f> 0b e9 eb fd ff ff 89 d9 80 e1 07 38 c1 0f 8c 5f fe ff ff 48 89 [ 317.095150][ C1] RSP: 0018:ffffc90000d90d78 EFLAGS: 00010046 [ 317.101208][ C1] RAX: ffffffff845ac71e RBX: 000000000000001a RCX: ffff88802cd29ac0 [ 317.109162][ C1] RDX: 0000000000010001 RSI: 000000000000001a RDI: 0000000000000001 [ 317.117119][ C1] RBP: ffff8880b9d26920 R08: ffffffff845ac501 R09: fffffbfff1a1cba6 [ 317.125073][ C1] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: dffffc0000000000 [ 317.133029][ C1] R13: 1ffff110173a4d1a R14: 0000000000fe4c00 R15: ffff888143948d40 [ 317.140997][ C1] ? vkms_vblank_simulate+0xa1/0x320 [ 317.146262][ C1] ? vkms_vblank_simulate+0x2be/0x320 [ 317.151635][ C1] ? vkms_vblank_simulate+0x2be/0x320 [ 317.156990][ C1] ? vkms_get_vblank_timestamp+0x210/0x210 [ 317.162786][ C1] __hrtimer_run_queues+0x48f/0x960 [ 317.167972][ C1] hrtimer_interrupt+0x3b3/0xe00 [ 317.173167][ C1] __sysvec_apic_timer_interrupt+0xf9/0x270 [ 317.179044][ C1] asm_call_irq_on_stack+0xf/0x20 [ 317.184051][ C1] [ 317.186987][ C1] sysvec_apic_timer_interrupt+0x9f/0xf0 [ 317.192605][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 317.198582][ C1] RIP: 0010:preempt_schedule_irq+0x7e/0x100 [ 317.204455][ C1] Code: 00 74 12 0f 0b 0f 1f 80 00 00 00 00 48 f7 03 08 00 00 00 74 75 bf 01 00 00 00 e8 7d 2a 0f f8 e8 78 ba 3a f8 fb bf 01 00 00 00 dd eb ff ff 9c 8f 04 24 43 80 3c 3c 00 74 08 4c 89 f7 e8 ba fd [ 317.224052][ C1] RSP: 0018:ffffc90001cef470 EFLAGS: 00000282 [ 317.230129][ C1] RAX: d818203e49877300 RBX: 0000000000000000 RCX: 0000000000040000 [ 317.238104][ C1] RDX: ffffc900137e5000 RSI: 000000000003ffff RDI: 0000000000000001 [ 317.246061][ C1] RBP: 0000000000000000 R08: ffffffff817b38a0 R09: fffffbfff1a1cba6 [ 317.254017][ C1] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: 1ffff9200039de8e [ 317.261976][ C1] R13: 0000000000000000 R14: ffffc90001cef470 R15: dffffc0000000000 [ 317.269947][ C1] ? trace_hardirqs_on+0x30/0x80 [ 317.274873][ C1] irqentry_exit+0xa7/0xb0 [ 317.279296][ C1] asm_sysvec_reschedule_ipi+0x12/0x20 [ 317.284755][ C1] RIP: 0010:lock_acquire+0x144/0x5e0 [ 317.290027][ C1] Code: c7 00 41 ae 89 e8 8c db e5 07 b8 ff ff ff ff 65 0f c1 05 5f e1 a8 7e 83 f8 01 0f 85 09 02 00 00 48 89 5c 24 18 ff 74 24 18 9d <65> 48 8b 04 25 28 00 00 00 48 3b 44 24 50 0f 85 32 04 00 00 48 83 [ 317.309627][ C1] RSP: 0018:ffffc90001cef560 EFLAGS: 00000246 [ 317.315713][ C1] RAX: 0000000000000001 RBX: 0000000000000246 RCX: 0000000000040000 [ 317.323675][ C1] RDX: ffffc900137e5000 RSI: 0000000000000000 RDI: 0000000000000000 [ 317.331648][ C1] RBP: 0000000000000000 R08: dffffc0000000000 R09: 0000000000000003 [ 317.339622][ C1] R10: fffffbfff1850c75 R11: 0000000000000004 R12: 0000000000000001 [ 317.347614][ C1] R13: 0000000000000000 R14: ffff88802cd2a444 R15: 0000000000000000 [ 317.355598][ C1] down_write+0x56/0x120 [ 317.359832][ C1] ? hugetlb_cow+0x751/0x1bc0 [ 317.364522][ C1] hugetlb_cow+0x751/0x1bc0 [ 317.369019][ C1] ? do_raw_spin_lock+0xfe/0x800 [ 317.373954][ C1] hugetlb_fault+0xa4c/0x1280 [ 317.378619][ C1] handle_mm_fault+0x223c/0x25a0 [ 317.383550][ C1] ? vmacache_find+0x4ef/0x5d0 [ 317.388307][ C1] ? vmacache_update+0x9f/0xf0 [ 317.393060][ C1] do_user_addr_fault+0x50d/0xad0 [ 317.398090][ C1] exc_page_fault+0xa1/0x1e0 [ 317.402668][ C1] asm_exc_page_fault+0x1e/0x30 [ 317.407504][ C1] RIP: 0010:__put_user_nocheck_8+0x3/0x21 [ 317.413207][ C1] Code: 00 00 48 39 d9 73 34 0f 1f 00 89 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f 00 00 48 39 d9 73 14 0f 1f 00 <48> 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 0f 1f 00 b9 f2 ff ff ff [ 317.432901][ C1] RSP: 0018:ffffc90001cefb98 EFLAGS: 00010297 [ 317.438967][ C1] RAX: 00007fae279a19d0 RBX: 00007fffffffeff9 RCX: 0000000020000080 [ 317.446939][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 317.454906][ C1] RBP: ffffc90001ceff38 R08: dffffc0000000000 R09: fffffbfff1a1cba6 [ 317.462884][ C1] R10: fffffbfff1a1cba6 R11: 0000000000000000 R12: 0000000000000000 [ 317.470854][ C1] R13: 0000000000000000 R14: 0000000000000027 R15: 00000000ffffffda [ 317.478839][ C1] __se_sys_prctl+0x2c2/0x2810 [ 317.483600][ C1] ? __lock_acquire+0x1351/0x5e90 [ 317.488630][ C1] ? __might_fault+0xb8/0x110 [ 317.493298][ C1] ? syscall_enter_from_user_mode+0x24/0x190 [ 317.499267][ C1] ? lockdep_hardirqs_on+0x8d/0x130 [ 317.504454][ C1] ? __x64_sys_prctl+0x1c/0xc0 [ 317.509206][ C1] do_syscall_64+0x2d/0x70 [ 317.513636][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.519518][ C1] RIP: 0033:0x45e159 [ 317.523413][ C1] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.543015][ C1] RSP: 002b:00007fae279a0c68 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 317.551426][ C1] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045e159 [ 317.559387][ C1] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000028 [ 317.567347][ C1] RBP: 000000000119bfb8 R08: 0000000000000000 R09: 0000000000000000 [ 317.575324][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 317.583284][ C1] R13: 00007fffc0982f9f R14: 00007fae279a19c0 R15: 000000000119bf8c [ 317.591715][ C1] Kernel Offset: disabled [ 317.596082][ C1] Rebooting in 86400 seconds..