[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.726572][ T23] audit: type=1800 audit(1581895695.666:25): pid=8716 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.745701][ T23] audit: type=1800 audit(1581895695.666:26): pid=8716 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.772326][ T23] audit: type=1800 audit(1581895695.666:27): pid=8716 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.31' (ECDSA) to the list of known hosts. 2020/02/16 23:28:25 fuzzer started 2020/02/16 23:28:26 dialing manager at 10.128.0.26:40471 2020/02/16 23:28:27 syscalls: 2951 2020/02/16 23:28:27 code coverage: enabled 2020/02/16 23:28:27 comparison tracing: enabled 2020/02/16 23:28:27 extra coverage: enabled 2020/02/16 23:28:27 setuid sandbox: enabled 2020/02/16 23:28:27 namespace sandbox: enabled 2020/02/16 23:28:27 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/16 23:28:27 fault injection: enabled 2020/02/16 23:28:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/16 23:28:27 net packet injection: enabled 2020/02/16 23:28:27 net device setup: enabled 2020/02/16 23:28:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/16 23:28:27 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:29:57 executing program 0: 23:29:57 executing program 1: syzkaller login: [ 158.762626][ T8882] IPVS: ftp: loaded support on port[0] = 21 [ 158.882023][ T8882] chnl_net:caif_netlink_parms(): no params data found 23:29:58 executing program 2: [ 159.021537][ T8888] IPVS: ftp: loaded support on port[0] = 21 [ 159.028633][ T8882] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.041921][ T8882] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.050164][ T8882] device bridge_slave_0 entered promiscuous mode [ 159.073838][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.081218][ T8882] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.089555][ T8882] device bridge_slave_1 entered promiscuous mode [ 159.140589][ T8882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.155358][ T8882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.193943][ T8882] team0: Port device team_slave_0 added [ 159.210287][ T8882] team0: Port device team_slave_1 added [ 159.236228][ T8882] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 159.243278][ T8882] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 159.270609][ T8882] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 159.286467][ T8882] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 159.293652][ T8882] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 159.321083][ T8882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 159.342831][ T8888] chnl_net:caif_netlink_parms(): no params data found [ 159.363819][ T8891] IPVS: ftp: loaded support on port[0] = 21 23:29:58 executing program 3: [ 159.396134][ T8882] device hsr_slave_0 entered promiscuous mode [ 159.453507][ T8882] device hsr_slave_1 entered promiscuous mode 23:29:58 executing program 4: [ 159.666886][ T8893] IPVS: ftp: loaded support on port[0] = 21 [ 159.689906][ T8888] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.697173][ T8888] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.707683][ T8888] device bridge_slave_0 entered promiscuous mode [ 159.731699][ T8888] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.753113][ T8888] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.772429][ T8888] device bridge_slave_1 entered promiscuous mode [ 159.911157][ T8899] IPVS: ftp: loaded support on port[0] = 21 [ 159.933985][ T8888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.995484][ T8891] chnl_net:caif_netlink_parms(): no params data found [ 160.011356][ T8888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:29:59 executing program 5: [ 160.081634][ T8893] chnl_net:caif_netlink_parms(): no params data found [ 160.158723][ T8888] team0: Port device team_slave_0 added [ 160.201484][ T8888] team0: Port device team_slave_1 added [ 160.234345][ T8891] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.241459][ T8891] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.249435][ T8891] device bridge_slave_0 entered promiscuous mode [ 160.263983][ T8882] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 160.315152][ T8882] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 160.377923][ T8891] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.385580][ T8891] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.393842][ T8891] device bridge_slave_1 entered promiscuous mode [ 160.401083][ T8888] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.408283][ T8888] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.435206][ T8888] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.450662][ T8903] IPVS: ftp: loaded support on port[0] = 21 [ 160.453317][ T8888] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.464130][ T8888] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.490802][ T8888] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.516224][ T8882] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 160.590353][ T8891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.655128][ T8888] device hsr_slave_0 entered promiscuous mode [ 160.712956][ T8888] device hsr_slave_1 entered promiscuous mode [ 160.752448][ T8888] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 160.760223][ T8888] Cannot create hsr debugfs directory [ 160.774173][ T8882] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 160.841678][ T8891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.868846][ T8891] team0: Port device team_slave_0 added [ 160.876956][ T8891] team0: Port device team_slave_1 added [ 160.911184][ T8893] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.918500][ T8893] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.926219][ T8893] device bridge_slave_0 entered promiscuous mode [ 160.968503][ T8891] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.975774][ T8891] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.001910][ T8891] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 161.014408][ T8891] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 161.021375][ T8891] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.048495][ T8891] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 161.062768][ T8893] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.070022][ T8893] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.079887][ T8893] device bridge_slave_1 entered promiscuous mode [ 161.107603][ T8893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.125077][ T8899] chnl_net:caif_netlink_parms(): no params data found [ 161.136382][ T8893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.171941][ T8893] team0: Port device team_slave_0 added [ 161.245179][ T8891] device hsr_slave_0 entered promiscuous mode [ 161.282715][ T8891] device hsr_slave_1 entered promiscuous mode [ 161.322552][ T8891] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 161.330181][ T8891] Cannot create hsr debugfs directory [ 161.336909][ T8893] team0: Port device team_slave_1 added [ 161.406215][ T8899] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.413733][ T8899] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.421291][ T8899] device bridge_slave_0 entered promiscuous mode [ 161.429360][ T8899] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.436486][ T8899] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.444375][ T8899] device bridge_slave_1 entered promiscuous mode [ 161.479019][ T8893] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 161.486722][ T8893] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.512888][ T8893] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 161.527297][ T8893] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 161.534357][ T8893] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.560619][ T8893] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 161.655252][ T8893] device hsr_slave_0 entered promiscuous mode [ 161.712676][ T8893] device hsr_slave_1 entered promiscuous mode [ 161.762434][ T8893] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 161.762467][ T8893] Cannot create hsr debugfs directory [ 161.788007][ T8903] chnl_net:caif_netlink_parms(): no params data found [ 161.821678][ T8899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.846934][ T8888] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 161.916495][ T8899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.944239][ T8888] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 161.984983][ T8888] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 162.055033][ T8888] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 162.119961][ T8899] team0: Port device team_slave_0 added [ 162.161277][ T8899] team0: Port device team_slave_1 added [ 162.187285][ T8903] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.194665][ T8903] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.204450][ T8903] device bridge_slave_0 entered promiscuous mode [ 162.240853][ T8903] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.249064][ T8903] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.256969][ T8903] device bridge_slave_1 entered promiscuous mode [ 162.265404][ T8899] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 162.272453][ T8899] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.298524][ T8899] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 162.336826][ T8899] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 162.344060][ T8899] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.370429][ T8899] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 162.408351][ T8903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.419813][ T8903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.430918][ T8891] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 162.478282][ T8882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.501130][ T8891] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 162.527960][ T8891] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 162.593027][ T8891] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 162.643184][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.652771][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.663319][ T8903] team0: Port device team_slave_0 added [ 162.678029][ T8882] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.690044][ T8893] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 162.784981][ T8899] device hsr_slave_0 entered promiscuous mode [ 162.822982][ T8899] device hsr_slave_1 entered promiscuous mode [ 162.862447][ T8899] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 162.870126][ T8899] Cannot create hsr debugfs directory [ 162.880174][ T8903] team0: Port device team_slave_1 added [ 162.898978][ T8903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 162.906146][ T8903] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.932288][ T8903] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 162.945580][ T8893] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 163.011145][ T8893] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 163.063861][ T8903] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.071388][ T8903] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.097834][ T8903] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.118448][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.127069][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.135693][ T3254] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.142901][ T3254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.150919][ T8893] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 163.214251][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.261716][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.275662][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.285366][ T2767] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.292576][ T2767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.355074][ T8903] device hsr_slave_0 entered promiscuous mode [ 163.392659][ T8903] device hsr_slave_1 entered promiscuous mode [ 163.433218][ T8903] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.440822][ T8903] Cannot create hsr debugfs directory [ 163.457312][ T8888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.480878][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.489557][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.498357][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.506812][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.552435][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.561031][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.570574][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.579611][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.605687][ T8888] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.630117][ T8882] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 163.650021][ T8882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.661772][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.670410][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.679153][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.687692][ T2772] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.694823][ T2772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.702640][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.711018][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.719712][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.728077][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.736759][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.744666][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.776050][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.786039][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.796387][ T2767] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.803522][ T2767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.811393][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.820856][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.830599][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.839561][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.851141][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.871670][ T8882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.885120][ T8891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.900093][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 163.911524][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 163.945147][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.959111][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.969018][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.978294][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.997540][ T8899] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 164.063039][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.071485][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.089115][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.097025][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.106255][ T8899] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 164.185597][ T8899] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 164.241938][ T8888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.256356][ T8888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.280453][ T8891] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.289676][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.299240][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.307749][ T8899] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 164.377034][ T8882] device veth0_vlan entered promiscuous mode [ 164.409306][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.417826][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.429048][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.438642][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.447632][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.454801][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.465441][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.474187][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.483021][ T2767] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.490093][ T2767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.497772][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.505364][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.513482][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.528752][ T8882] device veth1_vlan entered promiscuous mode [ 164.541968][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.550923][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.559150][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 164.567802][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.595391][ T8903] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 164.671442][ T8893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.679459][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.688412][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.699125][ T8888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.709767][ T8903] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 164.755071][ T8903] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 164.794645][ T8903] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 164.871945][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.880797][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.889752][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.898864][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.914683][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.923095][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.931840][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.940392][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.949234][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.960650][ T8882] device veth0_macvtap entered promiscuous mode [ 164.991461][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.000477][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.011773][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.020735][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.030044][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.038489][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.047133][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.056555][ T8891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.066406][ T8882] device veth1_macvtap entered promiscuous mode [ 165.087221][ T8893] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.122140][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.130633][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.139653][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.148540][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.157604][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.166875][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.173976][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.182992][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.190695][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.198540][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.215781][ T8899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.233478][ T8882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.254896][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.264422][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.275039][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.284227][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.292970][ T3254] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.300031][ T3254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.307822][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.315446][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.336360][ T8888] device veth0_vlan entered promiscuous mode [ 165.346112][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.360844][ T8882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.389899][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.398070][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.406749][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.415731][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.425066][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.433796][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.442645][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.451160][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.460326][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.472028][ T8899] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.494687][ T8888] device veth1_vlan entered promiscuous mode [ 165.510267][ T8891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.517744][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.526089][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.535152][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.543936][ T3253] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.550991][ T3253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.558836][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.568416][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.576949][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.585973][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.640384][ T8893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.672550][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.680551][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.689591][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.699296][ T3252] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.706392][ T3252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.714208][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.723067][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.824887][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.841914][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.850552][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.867243][ T8903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.896774][ T8893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.922752][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.931451][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.944980][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.954598][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.965134][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.974408][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.983067][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.991401][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.999820][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.008706][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.017127][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.024981][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.034019][ T8888] device veth0_macvtap entered promiscuous mode [ 166.045425][ T8888] device veth1_macvtap entered promiscuous mode [ 166.070704][ T8891] device veth0_vlan entered promiscuous mode [ 166.094555][ T8903] 8021q: adding VLAN 0 to HW filter on device team0 23:30:05 executing program 0: 23:30:05 executing program 0: io_setup(0x186, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 166.120111][ T8899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.141181][ T8899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.162432][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 166.184959][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.199192][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.210975][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.220450][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.233708][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.242972][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.251389][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.260569][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.275806][ T8888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.292070][ T8888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.304237][ T8888] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 166.327729][ T8891] device veth1_vlan entered promiscuous mode 23:30:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000040)={'crct10dif\x00'}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0) [ 166.351581][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.360521][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.374201][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.393317][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.402037][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.416292][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.429791][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.440320][ T3251] bridge0: port 1(bridge_slave_0) entered blocking state 23:30:05 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) getpid() semget$private(0x0, 0x0, 0x200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000080)=""/21) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xff, 0x0, 0x2}, &(0x7f00000000c0)=0x20) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 166.447421][ T3251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.455158][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.464022][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.472961][ T3251] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.480121][ T3251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.487773][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.519193][ T8899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.540315][ T8893] device veth0_vlan entered promiscuous mode [ 166.567596][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.579611][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.589530][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.597088][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.607891][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 23:30:05 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) getpid() semget$private(0x0, 0x0, 0x200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000080)=""/21) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xff, 0x0, 0x2}, &(0x7f00000000c0)=0x20) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 166.625238][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.634366][ T8888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.646943][ T8888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.672270][ C1] hrtimer: interrupt took 45096 ns [ 166.673656][ T8888] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 166.707306][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 23:30:05 executing program 0: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7f, 0x0, 0x20000e1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_REG_RULES={0x34, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x60}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 166.719062][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.737867][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.752094][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.761058][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.770931][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.779911][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.789300][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.800194][ T3251] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.838117][ T8942] EXT4-fs (loop0): bad s_min_extra_isize: 24929 [ 166.877883][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.890069][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.901793][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.910851][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.920252][ T8893] device veth1_vlan entered promiscuous mode [ 166.937417][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.952639][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.960600][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.970965][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 23:30:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) [ 167.075648][ T8891] device veth0_macvtap entered promiscuous mode [ 167.129868][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.144500][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 167.169606][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 23:30:06 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) [ 167.191306][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.214746][ T8891] device veth1_macvtap entered promiscuous mode [ 167.250705][ T8903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.290126][ T8893] device veth0_macvtap entered promiscuous mode [ 167.305319][ T23] kauditd_printk_skb: 3 callbacks suppressed [ 167.305328][ T23] audit: type=1800 audit(1581895806.246:31): pid=8956 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16523 res=0 [ 167.309084][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.375019][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 167.383726][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.408973][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.416817][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.425559][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.464464][ T8893] device veth1_macvtap entered promiscuous mode [ 167.478802][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.489741][ T23] audit: type=1800 audit(1581895806.426:32): pid=8956 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16523 res=0 [ 167.511921][ T8891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.524767][ T8891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.535347][ T8891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.546082][ T8891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.559662][ T8891] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 167.588928][ T8893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.609482][ T8893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.622185][ T8893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.639449][ T8893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.650034][ T8893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.661072][ T8893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.672672][ T8893] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 167.680952][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.690874][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.700215][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.708621][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.717477][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.726995][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.737257][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.745400][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.753463][ T8899] device veth0_vlan entered promiscuous mode [ 167.763774][ T8893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.774913][ T8893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.785094][ T8893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.796459][ T8893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.810388][ T8893] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 167.819172][ T8891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.832506][ T8891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.843917][ T8891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.855469][ T8891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.865587][ T8891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.876448][ T8891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.888688][ T8891] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 167.899356][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.908662][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.917931][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.927060][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.989411][ T8899] device veth1_vlan entered promiscuous mode [ 167.997020][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 168.005309][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.014560][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.267957][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 168.278225][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.287378][ T3253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.296487][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.304800][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.315671][ T8903] device veth0_vlan entered promiscuous mode [ 168.334993][ T8903] device veth1_vlan entered promiscuous mode [ 168.396083][ T8899] device veth0_macvtap entered promiscuous mode 23:30:07 executing program 2: 23:30:07 executing program 3: [ 168.467544][ T8899] device veth1_macvtap entered promiscuous mode [ 168.498588][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 168.548364][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 168.563970][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.583015][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.598890][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.634532][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 168.649526][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.658870][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.669344][ T8903] device veth0_macvtap entered promiscuous mode [ 168.685759][ T8903] device veth1_macvtap entered promiscuous mode [ 168.709212][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.722163][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.733702][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.745145][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.755798][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.767059][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.777131][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.787755][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.799520][ T8899] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 168.810303][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.822466][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.832626][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.845009][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.855202][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.866174][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.876326][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.887710][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.897899][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.909035][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.923157][ T8903] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 168.931303][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 168.943111][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.952951][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.966494][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.980075][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.992113][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.014937][ T0] NOHZ: local_softirq_pending 08 [ 169.018344][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.035371][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.048436][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.061588][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.075182][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.090856][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.102077][ T8903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.114604][ T8903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.127783][ T8903] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.140298][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.154666][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.170100][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.182620][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.194323][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.208418][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.222992][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.237525][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.253671][ T8899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.268143][ T8899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.282041][ T8899] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.291207][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.303202][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.314695][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.328614][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:30:08 executing program 4: 23:30:08 executing program 0: 23:30:08 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 23:30:08 executing program 2: 23:30:08 executing program 3: 23:30:08 executing program 5: 23:30:08 executing program 3: [ 169.809067][ T23] audit: type=1800 audit(1581895808.746:33): pid=8986 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16549 res=0 23:30:08 executing program 2: 23:30:08 executing program 0: 23:30:08 executing program 5: 23:30:08 executing program 4: 23:30:09 executing program 5: 23:30:09 executing program 2: 23:30:09 executing program 0: 23:30:09 executing program 1: 23:30:09 executing program 3: 23:30:09 executing program 5: 23:30:09 executing program 4: 23:30:09 executing program 0: 23:30:09 executing program 2: 23:30:09 executing program 3: 23:30:09 executing program 4: 23:30:09 executing program 1: 23:30:09 executing program 2: 23:30:09 executing program 0: 23:30:09 executing program 5: 23:30:09 executing program 3: 23:30:09 executing program 1: 23:30:09 executing program 4: 23:30:09 executing program 2: 23:30:09 executing program 0: 23:30:09 executing program 5: 23:30:09 executing program 4: 23:30:09 executing program 3: 23:30:09 executing program 1: 23:30:09 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[]) write$FUSE_INIT(r2, &(0x7f0000000080)={0x50, 0xfffffffffffffff5, 0x1}, 0x50) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f0000000580)="e98c57b779d1580e767d23d68ac9069c8101d88a32e02d90cdcab1d7fd363af760e3d2823d3371e2145cfab4d09952fa351b96e0383980638aa8bef79e63671e3bbabfcb02a8a67e7826ee40c28b0b428ce0c2373bdadd2c14ed85773362725cbe4121545e45366c4d0f0dfc2a3e43707e1e8d6bdb9b0a7db0334e4ec10cfa1fb52461bdbec5d040018adf4a3876278b8a5c2b76067222e65bb3f71bf84c5c447b18e36fa496192d819d5314387a77781feb69f9446c929ec19a89dfac80a8740658fd754a7339896f74f0"}, 0x1c) io_setup(0x7, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}]) r5 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) ioctl$KVM_SET_GSI_ROUTING(r5, 0x4008ae6a, &(0x7f00000003c0)=ANY=[@ANYBLOB="f2619ea2233bbe18210b4ec6554b3080957829f3523267637a030f7f7a61007c066b65eef16ad2da16862594c6febad19d9aac7acde093969bdf24f46d41237ab6679f8cfe6f1fddce55871bcc3784d5f06abdf8aa76c03b802df2158015c0b8c667a41ae726a14a8b"]) shutdown(r5, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) r6 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r6, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 23:30:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x8031, 0xffffffffffffffff, 0x0) 23:30:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:30:09 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x1) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000010c0)={0x77359400}, 0x10) r2 = dup(r1) read$eventfd(r2, &(0x7f0000001080), 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) 23:30:09 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000680)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a5c268", 0x10, 0x3c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, {[], @ndisc_ra}}}}, 0x42) 23:30:10 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x800, 0x6, 0x500}, 0x40) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) [ 171.135719][ T9070] ptrace attach of "/root/syz-executor.4"[9069] was attempted by "/root/syz-executor.4"[9070] 23:30:10 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[]) write$FUSE_INIT(r2, &(0x7f0000000080)={0x50, 0xfffffffffffffff5, 0x1}, 0x50) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f0000000580)="e98c57b779d1580e767d23d68ac9069c8101d88a32e02d90cdcab1d7fd363af760e3d2823d3371e2145cfab4d09952fa351b96e0383980638aa8bef79e63671e3bbabfcb02a8a67e7826ee40c28b0b428ce0c2373bdadd2c14ed85773362725cbe4121545e45366c4d0f0dfc2a3e43707e1e8d6bdb9b0a7db0334e4ec10cfa1fb52461bdbec5d040018adf4a3876278b8a5c2b76067222e65bb3f71bf84c5c447b18e36fa496192d819d5314387a77781feb69f9446c929ec19a89dfac80a8740658fd754a7339896f74f0"}, 0x1c) creat(0x0, 0x40) io_setup(0x7, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}]) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000003c0)=ANY=[@ANYBLOB="f2619ea2233bbe18210b4ec6554b3080957829f3523267637a030f7f7a61007c066b65eef16ad2da16862594c6febad19d9aac7acde093969bdf24f46d41237ab6679f8cfe6f1fddce55871bcc3784d5f06abdf8aa76c03b802df2158015c0b8c667a41ae726a14a8b"]) shutdown(0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 23:30:10 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 171.294954][ T9058] blk_update_request: I/O error, dev loop0, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 23:30:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80a00, 0x1) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:30:10 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 171.681259][ T23] audit: type=1804 audit(1581895810.616:34): pid=9108 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir127715353/syzkaller.3pTfkP/9/bus" dev="sda1" ino=16570 res=1 [ 171.773799][ T9110] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.788565][ T9110] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 171.801988][ T9110] blk_update_request: I/O error, dev loop0, sector 4 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.808317][ T23] audit: type=1804 audit(1581895810.676:35): pid=9108 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir127715353/syzkaller.3pTfkP/9/bus" dev="sda1" ino=16570 res=1 [ 171.814193][ T9110] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 171.814303][ T9110] blk_update_request: I/O error, dev loop0, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.814316][ T9110] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 171.814349][ T9110] blk_update_request: I/O error, dev loop0, sector 12 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.814362][ T9110] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 171.900409][ T9110] blk_update_request: I/O error, dev loop0, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.907798][ T23] audit: type=1804 audit(1581895810.706:36): pid=9108 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir127715353/syzkaller.3pTfkP/9/bus" dev="sda1" ino=16570 res=1 [ 171.914419][ T9110] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 171.914485][ T9110] blk_update_request: I/O error, dev loop0, sector 20 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.955614][ T23] audit: type=1804 audit(1581895810.716:37): pid=9116 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir127715353/syzkaller.3pTfkP/9/bus" dev="sda1" ino=16570 res=1 [ 171.965973][ T9110] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 171.966051][ T9110] blk_update_request: I/O error, dev loop0, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 23:30:10 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[]) write$FUSE_INIT(r2, &(0x7f0000000080)={0x50, 0xfffffffffffffff5, 0x1}, 0x50) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f0000000580)="e98c57b779d1580e767d23d68ac9069c8101d88a32e02d90cdcab1d7fd363af760e3d2823d3371e2145cfab4d09952fa351b96e0383980638aa8bef79e63671e3bbabfcb02a8a67e7826ee40c28b0b428ce0c2373bdadd2c14ed85773362725cbe4121545e45366c4d0f0dfc2a3e43707e1e8d6bdb9b0a7db0334e4ec10cfa1fb52461bdbec5d040018adf4a3876278b8a5c2b76067222e65bb3f71bf84c5c447b18e36fa496192d819d5314387a77781feb69f9446c929ec19a89dfac80a8740658fd754a7339896f74f0"}, 0x1c) io_setup(0x7, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}]) r5 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) ioctl$KVM_SET_GSI_ROUTING(r5, 0x4008ae6a, &(0x7f00000003c0)=ANY=[@ANYBLOB="f2619ea2233bbe18210b4ec6554b3080957829f3523267637a030f7f7a61007c066b65eef16ad2da16862594c6febad19d9aac7acde093969bdf24f46d41237ab6679f8cfe6f1fddce55871bcc3784d5f06abdf8aa76c03b802df2158015c0b8c667a41ae726a14a8b"]) shutdown(r5, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) r6 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r6, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 23:30:11 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000400)=@abs={0x1}, 0x6e) [ 171.966062][ T9110] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 171.966095][ T9110] blk_update_request: I/O error, dev loop0, sector 28 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.966104][ T9110] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 171.966140][ T9110] blk_update_request: I/O error, dev loop0, sector 32 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 171.966152][ T9110] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 172.089997][ T9110] Buffer I/O error on dev loop0, logical block 9, lost async page write 23:30:11 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2d63ffbaef8c1ee471c97c3c0903877b6283cf594b6b7ebed69c400d"], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000000000)=@abs={0x1}, 0x3) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000000400)=@abs={0x1}, 0x6e) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000003a00)=""/242, 0xf2}], 0x1, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r2, 0x0, 0x20000000000000d8) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x10, &(0x7f00000000c0), 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r8, @ANYBLOB], 0x4}}, 0x0) 23:30:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x3) 23:30:11 executing program 1: 23:30:11 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000400)=@abs={0x1}, 0x6e) 23:30:11 executing program 4: 23:30:11 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2d63ffbaef8c1ee471c97c3c0903877b6283cf594b6b7ebed69c400d"], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000000000)=@abs={0x1}, 0x3) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000000400)=@abs={0x1}, 0x6e) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000003a00)=""/242, 0xf2}], 0x1, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r2, 0x0, 0x20000000000000d8) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x10, &(0x7f00000000c0), 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r8, @ANYBLOB], 0x4}}, 0x0) 23:30:11 executing program 2: 23:30:11 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:11 executing program 2: 23:30:11 executing program 4: 23:30:11 executing program 0: 23:30:12 executing program 1: syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x802, 0x88) memfd_create(&(0x7f0000000440)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\n\xa3\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee\xf2\xdbQ\xe8BE\xc2\xe8h\xef2Yz\x8c!\x88@$\x88\xf5\a\xe8\xf4E\xacn\'\x96\xb9u\xf3\xc0}\xcc[\x8f\xbe\x14k\xb0\xce\xbdd\xb4Q\x90\x85ti1\fK\xd4N\r\x0f\x0e\xc4\x14\xda\x98\x06\xeaMY\xb42r\'MM\xbd7q!\xa6\x11}}\x98jB:\x8b\x1b@-\xfd\xe1A\xa6\xc7x\x1a}x\x93\xb0\xcavj\xbb\xa8\aLV\x1a\xfe\x93\xfb\xb0ec\'\x11@\x1eR\v%\\@\xfd\xd0\x7f\xf7o\'qn\x98\xf5\xb6T\b\x95\x8a\xc6\xbdG\xa5\xad\xfd\x15P9\xb6\x8d\x84\xf6&\xd9\xc2\x89A\x9dF\xbe\xf2\x12 \xbe\xe20\xb90\x13\x1c\xae\xdb=\xee\x1e\x945\x88:\xa5}\xdf\xad:ft\xc9\x9dE\x1b\xbf\x18\xd7@V\xb0\x05R\x04\xa5}\xa45\xb5\xc4\xb5\xd3K\xef\xdd\xbc\xb0\x87\v\xe8\xf8', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000), 0xffffffd4) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyprintk\x00', 0xc0002, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000380)='\n', 0x300}], 0x1) 23:30:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10, &(0x7f0000000180)) 23:30:12 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth0_to_team\x00'}) 23:30:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:30:12 executing program 5: memfd_create(&(0x7f0000000440)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\n\xa3\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee\xf2\xdbQ\xe8BE\xc2\xe8h\xef2Yz\x8c!\x88@$\x88\xf5\a\xe8\xf4E\xacn\'\x96\xb9u\xf3\xc0}\xcc[\x8f\xbe\x14k\xb0\xce\xbdd\xb4Q\x90\x85ti1\fK\xd4N\r\x0f\x0e\xc4\x14\xda\x98\x06\xeaMY\xb42r\'MM\xbd7q!\xa6\x11}}\x98jB:\x8b\x1b@-\xfd\xe1A\xa6\xc7x\x1a}x\x93\xb0\xcavj\xbb\xa8\aLV\x1a\xfe\x93\xfb\xb0ec\'\x11@\x1eR\v%\\@\xfd\xd0\x7f\xf7o\'qn\x98\xf5\xb6T\b\x95\x8a\xc6\xbdG\xa5\xad\xfd\x15P9\xb6\x8d\x84\xf6&\xd9\xc2\x89A\x9dF\xbe\xf2\x12 \xbe\xe20\xb90\x13\x1c\xae\xdb=\xee\x1e\x945\x88:\xa5}\xdf\xad:ft\xc9\x9dE\x1b\xbf\x18\xd7@V\xb0\x05R\x04\xa5}\xa45\xb5\xc4\xb5\xd3K\xef\xdd\xbc\xb0\x87\v\xe8\xf8', 0x0) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyprintk\x00', 0xc0002, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000380)='\n', 0x300}], 0x1) 23:30:12 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5453, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, 0x0) [ 173.210893][ T9175] [U] [ 173.252876][ T9175] [U] £ [ 173.256225][ T9175] [U] ê±(xbè0¥Ž—Mc´f²îj)´µ¨\f9vžØŸTô¯D»–þÒ ±æ¥nr1G0™îòÛQèBEÂèhï2YzŒ!ˆ@$ˆõèôE¬n'–¹uóÀ}Ì[¾k°Î½d´Q…ti1 KÔN [ 173.331775][ T9172] [U] ÄÚ˜êMY´2r'MM½7q!¦}}˜jB:‹@-ýáA¦Çx}x“°Êvj»¨LVþ“û°ec'@R %\@ýÐ÷o'qn˜õ¶T•ŠÆ½G¥­ýP9¶„ö&Ù‰AF¾ò ¾â0¹0®Û=î”5ˆ:¥}ß­:ftÉE¿×@V°R¥}¤5µÄµÓKïݼ°‡ èø [ 173.366564][ T9195] sctp: [Deprecated]: syz-executor.0 (pid 9195) Use of int in max_burst socket option. 23:30:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 173.366564][ T9195] Use struct sctp_assoc_value instead 23:30:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 173.473689][ T9199] [U] [ 173.498206][ T9199] [U] £ 23:30:12 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0x1f8, 0x0, 0x100, 0x100, 0x100, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xc0, 0x100, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ip={@remote, @loopback, 0x0, 0x0, '\x00', 'rose0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f0) 23:30:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f00000000c0)) r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @broadcast}}]}, 0x2c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000005200)=ANY=[@ANYBLOB="340000001400b59500000000000000000a000000", @ANYRES32=r5, @ANYBLOB="080008005f526bae1400020000000000000000000000ffffffffffd2018cbd8ffd69ff"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b525f}, @IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @broadcast}}]}, 0x34}}, 0x0) 23:30:12 executing program 1: syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x802, 0x88) memfd_create(&(0x7f0000000440)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\n\xa3\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee\xf2\xdbQ\xe8BE\xc2\xe8h\xef2Yz\x8c!\x88@$\x88\xf5\a\xe8\xf4E\xacn\'\x96\xb9u\xf3\xc0}\xcc[\x8f\xbe\x14k\xb0\xce\xbdd\xb4Q\x90\x85ti1\fK\xd4N\r\x0f\x0e\xc4\x14\xda\x98\x06\xeaMY\xb42r\'MM\xbd7q!\xa6\x11}}\x98jB:\x8b\x1b@-\xfd\xe1A\xa6\xc7x\x1a}x\x93\xb0\xcavj\xbb\xa8\aLV\x1a\xfe\x93\xfb\xb0ec\'\x11@\x1eR\v%\\@\xfd\xd0\x7f\xf7o\'qn\x98\xf5\xb6T\b\x95\x8a\xc6\xbdG\xa5\xad\xfd\x15P9\xb6\x8d\x84\xf6&\xd9\xc2\x89A\x9dF\xbe\xf2\x12 \xbe\xe20\xb90\x13\x1c\xae\xdb=\xee\x1e\x945\x88:\xa5}\xdf\xad:ft\xc9\x9dE\x1b\xbf\x18\xd7@V\xb0\x05R\x04\xa5}\xa45\xb5\xc4\xb5\xd3K\xef\xdd\xbc\xb0\x87\v\xe8\xf8', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000), 0xffffffd4) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyprintk\x00', 0xc0002, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000380)='\n', 0x300}], 0x1) [ 173.524060][ T9199] [U] ê±(xbè0¥Ž—Mc´f²îj)´µ¨\f9vžØŸTô¯D»–þÒ ±æ¥nr1G0™îòÛQèBEÂèhï2YzŒ!ˆ@$ˆõèôE¬n'–¹uóÀ}Ì[¾k°Î½d´Q…ti1 KÔN [ 173.591556][ T9209] x_tables: ip_tables: osf match: only valid for protocol 6 [ 173.622607][ T9199] [U] ÄÚ˜êMY´2r'MM½7q!¦}}˜jB:‹@-ýáA¦Çx}x“°Êvj»¨LVþ“û°ec'@R %\@ýÐ÷o'qn˜õ¶T•ŠÆ½G¥­ýP9¶„ö&Ù‰AF¾ò ¾â0¹0®Û=î”5ˆ:¥}ß­:ftÉE¿×@V°R¥}¤5µÄµÓKïݼ°‡ èø 23:30:12 executing program 0: syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x802, 0x88) memfd_create(&(0x7f0000000440)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\n\xa3\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee\xf2\xdbQ\xe8BE\xc2\xe8h\xef2Yz\x8c!\x88@$\x88\xf5\a\xe8\xf4E\xacn\'\x96\xb9u\xf3\xc0}\xcc[\x8f\xbe\x14k\xb0\xce\xbdd\xb4Q\x90\x85ti1\fK\xd4N\r\x0f\x0e\xc4\x14\xda\x98\x06\xeaMY\xb42r\'MM\xbd7q!\xa6\x11}}\x98jB:\x8b\x1b@-\xfd\xe1A\xa6\xc7x\x1a}x\x93\xb0\xcavj\xbb\xa8\aLV\x1a\xfe\x93\xfb\xb0ec\'\x11@\x1eR\v%\\@\xfd\xd0\x7f\xf7o\'qn\x98\xf5\xb6T\b\x95\x8a\xc6\xbdG\xa5\xad\xfd\x15P9\xb6\x8d\x84\xf6&\xd9\xc2\x89A\x9dF\xbe\xf2\x12 \xbe\xe20\xb90\x13\x1c\xae\xdb=\xee\x1e\x945\x88:\xa5}\xdf\xad:ft\xc9\x9dE\x1b\xbf\x18\xd7@V\xb0\x05R\x04\xa5}\xa45\xb5\xc4\xb5\xd3K\xef\xdd\xbc\xb0\x87\v\xe8\xf8', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000), 0xffffffd4) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyprintk\x00', 0xc0002, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000380)='\n', 0x300}], 0x1) [ 173.668297][ T9217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:30:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:12 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@random="5ff46b109e8e", @random="cee3e6e5ca52", @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="e322db3df309", @broadcast, @empty, @loopback}}}}, 0x0) 23:30:12 executing program 5: memfd_create(&(0x7f0000000440)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\n\xa3\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee\xf2\xdbQ\xe8BE\xc2\xe8h\xef2Yz\x8c!\x88@$\x88\xf5\a\xe8\xf4E\xacn\'\x96\xb9u\xf3\xc0}\xcc[\x8f\xbe\x14k\xb0\xce\xbdd\xb4Q\x90\x85ti1\fK\xd4N\r\x0f\x0e\xc4\x14\xda\x98\x06\xeaMY\xb42r\'MM\xbd7q!\xa6\x11}}\x98jB:\x8b\x1b@-\xfd\xe1A\xa6\xc7x\x1a}x\x93\xb0\xcavj\xbb\xa8\aLV\x1a\xfe\x93\xfb\xb0ec\'\x11@\x1eR\v%\\@\xfd\xd0\x7f\xf7o\'qn\x98\xf5\xb6T\b\x95\x8a\xc6\xbdG\xa5\xad\xfd\x15P9\xb6\x8d\x84\xf6&\xd9\xc2\x89A\x9dF\xbe\xf2\x12 \xbe\xe20\xb90\x13\x1c\xae\xdb=\xee\x1e\x945\x88:\xa5}\xdf\xad:ft\xc9\x9dE\x1b\xbf\x18\xd7@V\xb0\x05R\x04\xa5}\xa45\xb5\xc4\xb5\xd3K\xef\xdd\xbc\xb0\x87\v\xe8\xf8', 0x0) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyprintk\x00', 0xc0002, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000380)='\n', 0x300}], 0x1) 23:30:12 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:12 executing program 1: syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x802, 0x88) memfd_create(&(0x7f0000000440)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\n\xa3\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee\xf2\xdbQ\xe8BE\xc2\xe8h\xef2Yz\x8c!\x88@$\x88\xf5\a\xe8\xf4E\xacn\'\x96\xb9u\xf3\xc0}\xcc[\x8f\xbe\x14k\xb0\xce\xbdd\xb4Q\x90\x85ti1\fK\xd4N\r\x0f\x0e\xc4\x14\xda\x98\x06\xeaMY\xb42r\'MM\xbd7q!\xa6\x11}}\x98jB:\x8b\x1b@-\xfd\xe1A\xa6\xc7x\x1a}x\x93\xb0\xcavj\xbb\xa8\aLV\x1a\xfe\x93\xfb\xb0ec\'\x11@\x1eR\v%\\@\xfd\xd0\x7f\xf7o\'qn\x98\xf5\xb6T\b\x95\x8a\xc6\xbdG\xa5\xad\xfd\x15P9\xb6\x8d\x84\xf6&\xd9\xc2\x89A\x9dF\xbe\xf2\x12 \xbe\xe20\xb90\x13\x1c\xae\xdb=\xee\x1e\x945\x88:\xa5}\xdf\xad:ft\xc9\x9dE\x1b\xbf\x18\xd7@V\xb0\x05R\x04\xa5}\xa45\xb5\xc4\xb5\xd3K\xef\xdd\xbc\xb0\x87\v\xe8\xf8', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000), 0xffffffd4) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyprintk\x00', 0xc0002, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000380)='\n', 0x300}], 0x1) [ 173.871417][ T9217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:30:12 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0x0, 0xd0, 0xd0, 0x0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x4a}}}, {{@ipv6={@rand_addr="188b3b3eba8104c8bdfad85d4d430259", @ipv4, [], [], 'lo\x00', 'sit0\x00'}, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x5}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x5) open(0x0, 0x0, 0x1000000000000084) socket(0x11, 0x800000003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) socket(0x11, 0x800000003, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) socket(0x11, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000540)='nl80211\x00') wait4(r0, 0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) 23:30:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') r1 = epoll_create1(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='+', 0x1}], 0x1) [ 173.968098][ T9236] [U] 23:30:13 executing program 4: [ 174.002466][ T9236] [U] £ [ 174.006279][ T9236] [U] ê±(xbè0¥Ž—Mc´f²îj)´µ¨\f9vžØŸTô¯D»–þÒ ±æ¥nr1G0™îòÛQèBEÂèhï2YzŒ!ˆ@$ˆõèôE¬n'–¹uóÀ}Ì[¾k°Î½d´Q…ti1 KÔN 23:30:13 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 174.106662][ T9248] x_tables: duplicate underflow at hook 3 23:30:13 executing program 4: 23:30:13 executing program 0: [ 174.158189][ T9244] [U] ÄÚ˜êMY´2r'MM½7q!¦}}˜jB:‹@-ýáA¦Çx}x“°Êvj»¨LVþ“û°ec'@R %\@ýÐ÷o'qn˜õ¶T•ŠÆ½G¥­ýP9¶„ö&Ù‰AF¾ò ¾â0¹0®Û=î”5ˆ:¥}ß­:ftÉE¿×@V°R¥}¤5µÄµÓKïݼ°‡ èø [ 174.181133][ T9244] [U] [ 174.197541][ T9235] [U] £ 23:30:13 executing program 5: 23:30:13 executing program 4: [ 174.259683][ T9244] [U] ey ¨×ˆÒ{vf5êX [ 174.275132][ T9243] x_tables: duplicate underflow at hook 3 23:30:13 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 174.308702][ T9244] [U] ê±(xbè0¥Ž—Mc´f²îj)´µ¨\f9vžØŸTô¯D»–þÒ ±æ¥nr1G0™îòÛQèBEÂèhï2YzŒ!ˆ@$ˆõèôE¬n'–¹uóÀ}Ì[¾k°Î½d´Q…ti1 KÔN 23:30:13 executing program 5: 23:30:13 executing program 0: [ 174.477810][ T9238] [U] ÄÚ˜êMY´2r'MM½7q!¦}}˜jB:‹@-ýáA¦Çx}x“°Êvj»¨LVþ“û°ec'@R %\@ýÐ÷o'qn˜õ¶T•ŠÆ½G¥­ýP9¶„ö&Ù‰AF¾ò ¾â0¹0®Û=î”5ˆ:¥}ß­:ftÉE¿×@V°R¥}¤5µÄµÓKïݼ°‡ èø 23:30:13 executing program 1: 23:30:13 executing program 4: 23:30:13 executing program 5: 23:30:13 executing program 2: 23:30:13 executing program 0: 23:30:13 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x0, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:13 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x0, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:13 executing program 5: 23:30:13 executing program 2: 23:30:13 executing program 4: 23:30:13 executing program 0: 23:30:13 executing program 1: 23:30:13 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x0, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:13 executing program 2: 23:30:13 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r2, 0x545c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:30:13 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000300)='.\x00', 0xfe) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) 23:30:13 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000080)=""/45) 23:30:14 executing program 1: semget$private(0x0, 0xd3c42dc3aabcce5f, 0x0) 23:30:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x4, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000340)=""/142, 0x29, 0x8e, 0x1}, 0x20) 23:30:14 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x91, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x40) 23:30:14 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000019, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x40000) dup(0xffffffffffffffff) 23:30:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 23:30:14 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r1, 0x3, 0x8001, 0x8000) fallocate(r1, 0x3, 0x5e89, 0xfff9) [ 175.658083][ T9354] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.802591][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.812087][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.819746][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.985847][ T9354] bridge0: port 1(bridge_slave_0) entered disabled state 23:30:15 executing program 5: 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty, @val, {@ipv6}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000080)=""/194, 0xc2}], 0x1) 23:30:15 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) 23:30:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000840)=@mangle={'mangle\x00', 0x1f, 0x6, 0x510, 0x98, 0x130, 0x130, 0x0, 0x0, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, '\x00', 'veth1\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, '\x00', 'erspan0\x00'}, 0x0, 0x1f0, 0x218, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv4=@loopback, [], @ipv6=@ipv4={[], [], @empty}}, {@ipv4=@loopback, [], @ipv6=@dev}, {@ipv4=@dev, [], @ipv6=@rand_addr="6d3b770b8e4aa18602a5236c347ae1e7"}, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, [], @ipv4=@multicast1}]}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0x0, 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x797) socket$inet6(0xa, 0x0, 0x0) [ 176.079541][ T9366] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.088741][ T9366] bridge0: port 1(bridge_slave_0) entered forwarding state 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 176.165085][ T9385] x_tables: duplicate underflow at hook 1 23:30:15 executing program 1: 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:15 executing program 5: 23:30:15 executing program 2: [ 176.327043][ T9401] x_tables: duplicate underflow at hook 1 23:30:15 executing program 1: 23:30:15 executing program 0: 23:30:15 executing program 5: 23:30:15 executing program 2: 23:30:15 executing program 4: 23:30:15 executing program 0: 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000040)) 23:30:15 executing program 1: 23:30:15 executing program 5: 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000040)) 23:30:15 executing program 2: 23:30:15 executing program 4: 23:30:15 executing program 0: 23:30:15 executing program 5: 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000040)) 23:30:15 executing program 1: 23:30:15 executing program 2: 23:30:15 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[]}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 23:30:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) eventfd(0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create1(0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x2d8d29c4) clock_gettime(0x7, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x0, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:30:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='dioread_nolock']) 23:30:15 executing program 0: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 23:30:15 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, 0x0) 23:30:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r3 = dup2(r2, r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000300)) 23:30:16 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, 0x0) [ 177.156172][ T23] audit: type=1800 audit(1581895816.096:38): pid=9462 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16620 res=0 23:30:16 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[]}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 177.222440][ T9465] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 23:30:16 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, 0x0) 23:30:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) eventfd(0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x2d8d29c4) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=0xe, 0x80000) openat(r2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:30:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000100)="660f382b1a0f01df0f300f32d9e90f79d16665676426f7c5000000000f22fd4545ef1e03e5", 0x25}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)={0x40}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000380)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x4cb], 0x10000}) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000040)={[0x0, 0x2, 0x0, 0x2], 0x3, 0x2, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:30:16 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[]}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 23:30:16 executing program 3: r0 = epoll_create1(0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000500)='/dev/snd/seq\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) [ 177.588966][ T9498] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 23:30:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x800000000e006, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="eb3c906de9fb8ab5666174000400010002000270fff8", 0x16}], 0x0, 0x0) 23:30:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) r2 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r2, &(0x7f0000000080), 0xfffffe5e) fdatasync(r2) 23:30:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x2) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semget$private(0x0, 0x2, 0x500) r2 = semget$private(0x0, 0x207, 0x0) semop(r2, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) r4 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xfec0) 23:30:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semget$private(0x0, 0x0, 0x500) r2 = semget$private(0x0, 0x207, 0x0) semop(r2, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x88}}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0xfec0) 23:30:16 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfed) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x23010, 0x0) 23:30:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 23:30:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 178.226639][ T9526] FAT-fs (loop5): bogus sectors per cluster 0 [ 178.241194][ T9526] FAT-fs (loop5): Can't find a valid FAT filesystem 23:30:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 23:30:17 executing program 5: r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) 23:30:17 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:17 executing program 2: 23:30:17 executing program 5: [ 178.567988][ T9548] usb usb7: usbfs: process 9548 (syz-executor.1) did not claim interface 0 before use 23:30:17 executing program 5: 23:30:17 executing program 3: 23:30:17 executing program 2: 23:30:17 executing program 4: 23:30:17 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:17 executing program 5: 23:30:18 executing program 4: [ 179.054597][ T9565] usb usb7: usbfs: process 9565 (syz-executor.1) did not claim interface 0 before use 23:30:18 executing program 0: 23:30:18 executing program 5: 23:30:18 executing program 2: 23:30:18 executing program 4: 23:30:18 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:18 executing program 3: 23:30:18 executing program 4: [ 179.429320][ T9579] usb usb7: usbfs: process 9579 (syz-executor.1) did not claim interface 0 before use 23:30:18 executing program 3: 23:30:18 executing program 5: 23:30:18 executing program 2: 23:30:18 executing program 0: 23:30:18 executing program 4: 23:30:18 executing program 2: 23:30:18 executing program 3: 23:30:18 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:18 executing program 5: 23:30:18 executing program 0: 23:30:18 executing program 3 (fault-call:2 fault-nth:0): clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4040015) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r2, @ANYBLOB="19000000000000001c0012000c00010062010064676500000c0002000800050001000000", @ANYRES32=r3], 0x4}}, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0xc) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x20, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[]}, 0x1, 0x0, 0x0, 0x44000}, 0x1) 23:30:18 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000800)={'bridge_slave_0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000000c0)=0x4, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000040)={0x2c, 0xa, r2}, 0x10) socket(0x2000000000000021, 0x2, 0x10000000000002) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) [ 179.790390][ T9604] usb usb7: usbfs: process 9604 (syz-executor.1) did not claim interface 0 before use 23:30:18 executing program 5: socket$unix(0x1, 0x2, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) socket$alg(0x26, 0x5, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='errors=remount-ro,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,errors=continue,mft_zone_multiplier=0x0000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c6db8cee83b0600000000000000303030303030303030322c666d61733e469ab6f2ab84bef531588a95671ea26b3d30303030303030303030303030303030303030303030302300001000"/87]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x30002, 0x10) [ 179.905370][ T9614] FAULT_INJECTION: forcing a failure. [ 179.905370][ T9614] name failslab, interval 1, probability 0, space 0, times 1 [ 179.938359][ T9614] CPU: 1 PID: 9614 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 179.946992][ T9614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.957144][ T9614] Call Trace: [ 179.960453][ T9614] dump_stack+0x1fb/0x318 [ 179.964814][ T9614] should_fail+0x4b8/0x660 [ 179.969524][ T9614] __should_failslab+0xb9/0xe0 [ 179.974337][ T9614] should_failslab+0x9/0x20 [ 179.978851][ T9614] kmem_cache_alloc_trace+0x5d/0x2f0 [ 179.984308][ T9614] ? __request_module+0x264/0x8c0 [ 179.989349][ T9614] ? trace_module_request+0x29c/0x2e0 [ 179.994735][ T9614] ? do_ipt_get_ctl+0x405/0x9b0 [ 179.996466][ T9619] ntfs: (device loop5): parse_options(): Unrecognized mount option m¸Îè;. [ 179.999719][ T9614] __request_module+0x264/0x8c0 [ 179.999739][ T9614] ? do_ipt_get_ctl+0x33b/0x9b0 [ 179.999760][ T9614] ? mutex_unlock+0xd/0x10 [ 180.022476][ T9614] ? xt_find_revision+0x5ba/0x620 [ 180.027540][ T9614] do_ipt_get_ctl+0x405/0x9b0 [ 180.032254][ T9614] ? __kasan_check_write+0x14/0x20 [ 180.037376][ T9614] ? __mutex_unlock_slowpath+0x13b/0x5b0 [ 180.043039][ T9614] nf_getsockopt+0x27b/0x2a0 [ 180.047650][ T9614] ip_getsockopt+0x10b/0x1f0 23:30:18 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:18 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 180.052279][ T9614] raw_getsockopt+0x64/0x70 [ 180.056818][ T9614] sock_common_getsockopt+0x99/0xb0 [ 180.062040][ T9614] __sys_getsockopt+0x24c/0x2b0 [ 180.066913][ T9614] __x64_sys_getsockopt+0xbf/0xd0 [ 180.072046][ T9614] do_syscall_64+0xf7/0x1c0 [ 180.076657][ T9614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.082896][ T9614] RIP: 0033:0x45c6c9 [ 180.086782][ T9614] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:30:19 executing program 0: r0 = socket(0x10, 0x80002, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x6, 0x18, 0x2}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 180.106387][ T9614] RSP: 002b:00007fc35a44bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 180.114805][ T9614] RAX: ffffffffffffffda RBX: 00007fc35a44c6d4 RCX: 000000000045c6c9 [ 180.122764][ T9614] RDX: 0000000000000043 RSI: 0000000000000000 RDI: 0000000000000003 [ 180.130733][ T9614] RBP: 000000000076bf20 R08: 0000000020000040 R09: 0000000000000000 [ 180.138688][ T9614] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000004 [ 180.146690][ T9614] R13: 000000000000012c R14: 00000000004d1418 R15: 0000000000000000 23:30:19 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000002000070700fffd946f6105000a000000fe0208010001080008000c000400ff7e", 0x24}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 23:30:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000000)=0x32, 0x18) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000000500)={0x2, 0x4, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x2, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 180.232604][ T9625] ntfs: (device loop5): parse_options(): Unrecognized mount option m¸Îè;. 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x3, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:19 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r6, @ANYBLOB="001d00c2e6bb9a396dfddfb588374cb500000002000000000000000000baecf232177ca894d6462b79ed2c9517691ec42aeebc10fc3c18c69c12840800000000000000afba55"], 0x28}}, 0x0) 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x4, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:19 executing program 5: r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000300)=""/156, 0x9c, 0x2042, &(0x7f0000000180), 0x20) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d4, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58ab16f88b9663da5668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef06a3afcb79eda41d0d8d5e501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000005000000781f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f00"/174], 0x10}}, 0x0) [ 180.510583][ T9665] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x5, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="018100ff00000000000002000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x1cc, r5, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x355}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x96f8}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23e7c24a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x224}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff05c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ed}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8a7cc3d4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x83d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0x0, 0x0, 0x4cb, 0x0, 0x89, 0x0, 0x10], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x480, 0x0) ioctl$EVIOCGSW(r7, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x3b8, 0xf0, 0x0, 0xf0, 0xf0, 0xf0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ipv6={@remote, @loopback, [], [], 'syzkaller1\x00', 'batadv0\x00'}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "f9bd21540f53b2c7a5b39182d36cbaad46dcab705fbace3b6f1206c4925b04674cb5aad39b95da10846e49461fc1473b45d2795241da571e9c265b6dfe86f198375768268b5dff170afe6bcd2ff403b998d3ab3f5bd6599ec223e09c3f874f611973b4a6944879c9975f0d9bdadfdb1f56ff00b7561753bad9129806116f96e1", 0x2c}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x418) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040)=0x81, 0x4) 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 180.680049][ T9665] bond1: (slave bridge1): making interface the new active one 23:30:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x3b8, 0xf0, 0x0, 0xf0, 0xf0, 0xf0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ipv6={@remote, @loopback, [], [], 'syzkaller1\x00', 'batadv0\x00'}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "f9bd21540f53b2c7a5b39182d36cbaad46dcab705fbace3b6f1206c4925b04674cb5aad39b95da10846e49461fc1473b45d2795241da571e9c265b6dfe86f198375768268b5dff170afe6bcd2ff403b998d3ab3f5bd6599ec223e09c3f874f611973b4a6944879c9975f0d9bdadfdb1f56ff00b7561753bad9129806116f96e1", 0x2c}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x418) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040)=0x81, 0x4) [ 180.784485][ T9665] bond1: (slave bridge1): Enslaving as an active interface with an up link 23:30:19 executing program 4: r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x35}}], 0x50) r1 = getpgrp(0x0) timer_create(0x1, &(0x7f0000000040)={0x0, 0x30, 0x0, @tid=r1}, &(0x7f0000000080)) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendmsg$kcm(r2, &(0x7f0000001600)={&(0x7f0000000140)=@phonet={0x23, 0x5, 0x4, 0x6}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f00000001c0)="73bfcf41306b0438e39673c4770577cc74d9395d7f3261f2bb64f12c6ba28cb37192b9310f97b70bfe877b", 0x2b}, {&(0x7f0000001280)="bfb074b2f0684c09110c40cd19287832382885d31eb4f2aa4faaa56d445f6159bb55e281e36f506aa1a84b085e00719a66f7957489f2afa6ab932779d509c341627ce568a5e2b34ae052dc9eb73c01132f02830d01f493d7a3a0a6839f532520adb9a813f8d5388074ea51af3634cd432d07b9011728af7468e3d95a607ee4658f8406b335e0df4f075e81b325370d2d107d075f18f077f2a80ee7c54577b9ab07c2db07a23d07618f2c5d14e49c37e6023439c811c69022bbb6f7405cbb0a229f88a6ce5995d0ab27104c022aa9ca7d64fc", 0xd2}, {&(0x7f0000000200)="a3fe42e92b79", 0x6}, {&(0x7f0000001380)="212ba72c1335ff82ae252a6671a096c70c710745c88edfbe484d80f760fa3d90f819789cdc8fcb78ba5cc219c863541e7782740f200a52cc44b587c1116f93812497ea4fe947c643edd28d9690c00fb5f1adaa6fe4c8057a631b3715d151c3e669eee177b33ab170eb49154c3639d523787d5ce471a3db16d631f098d99c7a78ed5cad98119d89e058e09d76c101b4c2", 0x90}, {&(0x7f0000001440)="a1fc2e11fcf9c266147cc066761ed54684acafe99d50e6b38a47a34c1478400ebbacf3b0386302dcc08e661f68d7ad163c7214e093228c561e49ece15936cc80beabc17d29a328c9b586666e80e4fc037629f9563d68f95e48bc9c2f4f66cdccca59bcc72de4a0f55ce5fd7cc9bf92314dfe67889302a54caed8660b228f1afd95fc94dfc006d3896bc9f950a7bf9695403048cab08c9cdde635c0fb30b9017fe06a2219d8f5ed", 0xa7}, {&(0x7f0000001500)="8be3f071e4dc753e7f1ea579240859b62122390dbfc25d0fb889f7aff10b712c048587ba697a1f481d2684adc50ef27ac37e2e89f5a252096c6cc107a25413d4b127ff", 0x43}], 0x7}, 0x40000) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x2, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 180.893321][ T9685] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 23:30:19 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x7, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 181.024536][ T9697] bond1: (slave bridge2): Enslaving as an active interface with a down link [ 181.074279][ T9685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 181.089981][ T9685] device bond1 entered promiscuous mode [ 181.096312][ T9685] device bridge1 entered promiscuous mode 23:30:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r6, @ANYBLOB="001d00c2e6bb9a396dfddfb588374cb500000002000000000000000000baecf232177ca894d6462b79ed2c9517691ec42aeebc10fc3c18c69c12840800000000000000afba55"], 0x28}}, 0x0) 23:30:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 181.336132][ T9739] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 181.548081][ T9747] bond2: (slave bridge3): making interface the new active one [ 181.593700][ T9747] bond2: (slave bridge3): Enslaving as an active interface with an up link [ 181.635363][ T9739] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 181.647369][ T9739] device bond2 entered promiscuous mode 23:30:20 executing program 5: r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000300)=""/156, 0x9c, 0x2042, &(0x7f0000000180), 0x20) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d4, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58ab16f88b9663da5668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef06a3afcb79eda41d0d8d5e501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000005000000781f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f00"/174], 0x10}}, 0x0) 23:30:20 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x8, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:20 executing program 1: syz_open_dev$usbfs(0x0, 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 181.723247][ T9739] device bridge3 entered promiscuous mode 23:30:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="018100ff00000000000002000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x1cc, r5, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x355}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x96f8}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23e7c24a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x224}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff05c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ed}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8a7cc3d4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x83d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0x0, 0x0, 0x4cb, 0x0, 0x89, 0x0, 0x10], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x480, 0x0) ioctl$EVIOCGSW(r7, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:30:20 executing program 4: r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000300)=""/156, 0x9c, 0x2042, &(0x7f0000000180), 0x20) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d4, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58ab16f88b9663da5668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef06a3afcb79eda41d0d8d5e501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000005000000781f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f00"/174], 0x10}}, 0x0) 23:30:20 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x9, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:20 executing program 1: syz_open_dev$usbfs(0x0, 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="018100ff00000000000002000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x1cc, r5, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x355}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x96f8}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23e7c24a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x224}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff05c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ed}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8a7cc3d4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x83d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0x0, 0x0, 0x4cb, 0x0, 0x89, 0x0, 0x10], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x480, 0x0) ioctl$EVIOCGSW(r7, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:30:20 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xa, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:20 executing program 1: syz_open_dev$usbfs(0x0, 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:21 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xb, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:21 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:21 executing program 5: r0 = socket(0xa, 0xa, 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80040, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000400)={@multicast1, @broadcast, 0x0}, &(0x7f0000000440)=0xc) connect$can_j1939(r2, &(0x7f0000000480)={0x1d, r4, 0x3, {0x1, 0x1}, 0x2}, 0x18) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x4}, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100)={0x8}, 0x10) write(r0, &(0x7f0000000080)="240000004a005f0214f9f407000904000a00000000000000090000000800020000000000", 0x24) 23:30:21 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xc, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:21 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="018100ff00000000000002000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x1cc, r5, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x355}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x96f8}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23e7c24a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x224}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff05c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ed}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8a7cc3d4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x83d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0x0, 0x0, 0x4cb, 0x0, 0x89, 0x0, 0x10], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x480, 0x0) ioctl$EVIOCGSW(r7, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:30:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="018100ff00000000000002000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x1cc, r5, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x355}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x96f8}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23e7c24a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x224}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff05c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ed}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8a7cc3d4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x83d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0x0, 0x0, 0x4cb, 0x0, 0x89, 0x0, 0x10], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x480, 0x0) ioctl$EVIOCGSW(r7, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:30:22 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:22 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:22 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) write(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x0, 0x3, @loopback, 0x4}, {0xa, 0x0, 0x0, @dev, 0x9}, 0x9, [0x0, 0x5, 0x1, 0x5, 0x0, 0x8001, 0x0, 0x200]}, 0x5c) fdatasync(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(r5, 0x80024321, &(0x7f0000000040)) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x10) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 23:30:22 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xe, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:22 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 183.231311][ T23] audit: type=1804 audit(1581895822.166:39): pid=9908 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/38/bus" dev="sda1" ino=16646 res=1 23:30:22 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x10, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 183.353309][ T23] audit: type=1804 audit(1581895822.216:40): pid=9900 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/38/bus" dev="sda1" ino=16646 res=1 23:30:22 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r1, 0x80084121, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200, 0x0) fchmodat(r3, &(0x7f0000000240)='./file0\x00', 0x2) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000010ffeb050769fa9e0c0000000000eb9897a88ca3af97abdb66f2efc7363f01e4afc1044ae4edd0bf2bb4000000000000698e1abd4e9e869e98fdaca264fb752d25252981aa73dc0834cb7ef7765e3370e81b7732280b3a8e505cfd97483265865177e03e9ec16fe5aa5f04e9c3fbe2c88586717fe408a2c9d9a4a9ededab5752e70d7e540a5ae5cd8293c5d828a191d65722a3d86eb3b5a25a655fe01f000000000000006fc11183d454ffea6c", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x0) 23:30:22 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 183.503996][ T23] audit: type=1804 audit(1581895822.426:41): pid=9908 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/38/bus" dev="sda1" ino=16646 res=1 23:30:22 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x11, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:22 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 183.668410][ T23] audit: type=1804 audit(1581895822.516:42): pid=9900 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/38/bus" dev="sda1" ino=16646 res=1 [ 183.752498][ T23] audit: type=1804 audit(1581895822.526:43): pid=9908 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/38/bus" dev="sda1" ino=16646 res=1 [ 183.784553][ T23] audit: type=1804 audit(1581895822.576:44): pid=9908 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/38/bus" dev="sda1" ino=16646 res=1 [ 184.134634][ T9929] syz-executor.5 (9929) used greatest stack depth: 22904 bytes left 23:30:23 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @rand_addr=0xffb}}, 0x1c) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_rm_watch(r1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000, &(0x7f0000618000)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0xcb, 0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x24008100) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:30:23 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) write(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x0, 0x3, @loopback, 0x4}, {0xa, 0x0, 0x0, @dev, 0x9}, 0x9, [0x0, 0x5, 0x1, 0x5, 0x0, 0x8001, 0x0, 0x200]}, 0x5c) fdatasync(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(r5, 0x80024321, &(0x7f0000000040)) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x10) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 23:30:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:23 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x12, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x10, 0x3, 0x398, 0x0, 0x0, 0x0, 0x140, 0x140, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x3, 0x0, {[{{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, [], [], 'veth0_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x160, 0x188, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x0, 0x0, 0x4}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr="0d323fadeb703ac391ba97801de903b9", @mcast1}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000780)={0x0, 0xfffffffffffffffc, 0x6a, 0x8, @scatter={0x9, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000900)=""/79, 0x4f}, {&(0x7f0000000980)=""/198, 0xc6}, {&(0x7f0000000ec0)=""/207, 0xcf}, {&(0x7f0000000b80)=""/175, 0xaf}, {&(0x7f0000001080)=""/212, 0xd4}, {&(0x7f0000000d80)=""/172, 0xac}, {&(0x7f0000000800)=""/71, 0x47}, {&(0x7f0000000040)=""/66, 0x42}, {&(0x7f0000000580)=""/5, 0x5}]}, &(0x7f0000000880)="29cf3a01816268e32aea1cfda38f8d98ce77c847a1992d1a8026250130741ef33e6a816b82f6468e4711ed49b0703d9b6359a2021ddb3b095cadf9c2f0dcbf65c56fafef06a4c096abce99f61dbd910daf28aa99f3df12672e0aa1792c4d1d4f72502267a7bf14c7767f", &(0x7f0000000640)=""/203, 0x7f, 0x32, 0x3, &(0x7f00000005c0)}) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$PNPIPE_INITSTATE(r6, 0x113, 0x4, &(0x7f0000000100), &(0x7f0000000600)=0x4) 23:30:23 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x300, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 184.386296][ T9962] xt_addrtype: input interface limitation not valid in POSTROUTING and OUTPUT [ 184.445898][ T23] audit: type=1804 audit(1581895823.386:45): pid=9967 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/39/bus" dev="sda1" ino=16657 res=1 23:30:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) [ 184.494128][ T9969] xt_addrtype: input interface limitation not valid in POSTROUTING and OUTPUT 23:30:23 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r1, 0x80084121, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200, 0x0) fchmodat(r3, &(0x7f0000000240)='./file0\x00', 0x2) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000010ffeb050769fa9e0c0000000000eb9897a88ca3af97abdb66f2efc7363f01e4afc1044ae4edd0bf2bb4000000000000698e1abd4e9e869e98fdaca264fb752d25252981aa73dc0834cb7ef7765e3370e81b7732280b3a8e505cfd97483265865177e03e9ec16fe5aa5f04e9c3fbe2c88586717fe408a2c9d9a4a9ededab5752e70d7e540a5ae5cd8293c5d828a191d65722a3d86eb3b5a25a655fe01f000000000000006fc11183d454ffea6c", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x0) 23:30:23 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x500, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 184.618998][ T23] audit: type=1804 audit(1581895823.556:46): pid=9959 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/39/bus" dev="sda1" ino=16657 res=1 23:30:23 executing program 4: ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000180)) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffff00, 0x22c80) 23:30:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000040)={0x0, 0x2, [{0x1, 0x1}, {}]}) 23:30:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, 0x0) [ 184.922188][ T23] audit: type=1804 audit(1581895823.856:47): pid=9967 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir254790225/syzkaller.R5X9hM/39/bus" dev="sda1" ino=16657 res=1 23:30:24 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @rand_addr=0xffb}}, 0x1c) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_rm_watch(r1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000, &(0x7f0000618000)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0xcb, 0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x24008100) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:30:24 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x600, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007911020000000000851000000200000085000000000040400000d5000012000000009500a5050000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x4}, 0x16, 0x0) setreuid(0x0, r2) ioprio_get$uid(0x3, r2) 23:30:24 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, 0x0) 23:30:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000300), 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000140)=""/136) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e27, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) shutdown(r1, 0x1) 23:30:24 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x700, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x80400, 0x108) ioctl$TIOCSCTTY(r3, 0x540e, 0x1) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000000c0)={0x7fffffff, 0x2, 0x4, 0x100, 0x4b1, {0x0, 0x7530}, {0x1, 0x1, 0xfa, 0x79, 0x9, 0x5, "a62f9965"}, 0x2, 0x4, @offset=0xfffffbe4, 0x6, 0x0, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r6, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmctl$SHM_INFO(r6, 0xe, &(0x7f00000001c0)=""/58) shmctl$IPC_RMID(r6, 0x0) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept$packet(r7, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$smack_current(r10, &(0x7f0000000000)={'/dev/ptmx\x00'}, 0xb) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000340)={@remote, 0x35, r8}) 23:30:24 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, 0x0) 23:30:24 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @rand_addr=0xffb}}, 0x1c) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_rm_watch(r1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000, &(0x7f0000618000)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0xcb, 0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x24008100) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:30:24 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x900, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x80400, 0x108) ioctl$TIOCSCTTY(r3, 0x540e, 0x1) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000000c0)={0x7fffffff, 0x2, 0x4, 0x100, 0x4b1, {0x0, 0x7530}, {0x1, 0x1, 0xfa, 0x79, 0x9, 0x5, "a62f9965"}, 0x2, 0x4, @offset=0xfffffbe4, 0x6, 0x0, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r6, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmctl$SHM_INFO(r6, 0xe, &(0x7f00000001c0)=""/58) shmctl$IPC_RMID(r6, 0x0) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept$packet(r7, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$smack_current(r10, &(0x7f0000000000)={'/dev/ptmx\x00'}, 0xb) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000340)={@remote, 0x35, r8}) 23:30:24 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xa00, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:24 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x10020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = io_uring_setup(0x64, &(0x7f0000000040)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000200)={0x9d0000, 0x8, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x9c090b, 0x80000000, [], @p_u16=&(0x7f0000000180)=0x7}}) accept4$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80800) dup3(r3, r2, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x1ce) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 23:30:24 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:25 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xb00, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 186.040294][T10057] usb usb7: usbfs: process 10057 (syz-executor.1) did not claim interface 0 before use 23:30:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000300), 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000140)=""/136) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e27, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) shutdown(r1, 0x1) 23:30:25 executing program 5: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000300), 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000140)=""/136) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e27, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) shutdown(r1, 0x1) 23:30:25 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x0, 0x1}]}) 23:30:25 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x0, 0x1}]}) 23:30:25 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xc00, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:25 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000300), 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000140)=""/136) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e27, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) shutdown(r1, 0x1) 23:30:25 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x10020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = io_uring_setup(0x64, &(0x7f0000000040)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000200)={0x9d0000, 0x8, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x9c090b, 0x80000000, [], @p_u16=&(0x7f0000000180)=0x7}}) accept4$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80800) dup3(r3, r2, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x1ce) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 23:30:25 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd00, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:25 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x0, 0x1}]}) 23:30:25 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xe00, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:25 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1}]}) 23:30:25 executing program 5: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000300), 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000140)=""/136) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e27, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) shutdown(r1, 0x1) 23:30:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000000)) unshare(0x40000000) 23:30:25 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000f00)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575265f7fb786bc8748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d1c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b100709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc520000000c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5329d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90bc3396246525f73269136200f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c607000e8dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a94f6995637672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b01478fc7cf47aa0720c0fa7302e003000000b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87db0100000000000000486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a08e30158ac98d50aaef479dc4e34fcabf4f568c09a6d2955cd0bcbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c121fe2189b489503a3faa51640dd16a4ea7e2fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce327a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03000000000000000000000000000000b642caddfd667a0f9fc90bc9a961ad1739e88d36824daa9c14b345180e8bdd38f930c9bef4c9511faeabc144f38f609fda27e23f8a514ca10e86a4b4ea7a32083091e023661881cfada03916b9fc282669fdb25ba64682b8a4272c8c1967b200bd3cf1147cf446d65d6af1d4797a76879f46869b408f396057fb15fbe47751b93634f81f6f98292e5e39f4205800000000000000fe890771b0afd6b507c2f225c14d56944b1f73a88872045360c6f2515c303d30e880e719cbf89bc8cb7a6d989d756ca99691a30f7caa92b0f2216a3eb5301d849d67a56c5c78ca15ba5d3374788b22a7d27a00de2afd1f1c11305706d72001cb8d31e7b87f670608d6d9ca8ade4a276ab734fd4f9d1809596777427e2bb13bb673c75d27dacfc71e41c38cab7bfefaec87df026ff908102d7495355760039bd7882a7ca1afeb3ead921fd631c6e89c64c7ef135f98891f"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0xa, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r6, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000004100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x32e658d21756662}, 0xc, &(0x7f00000040c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="02000d000d000f005d0a040008000500021f0000080005000501000008000500e001000008000500063f00000c0001006866736300000000440002001000030001000000e9ffffff0900000010000300ff000000c80c0000060000001000030000000080000000c8640000100003000800000009000000000000000800050004fb0000080001006d710000080005000000000000"], 0xac}, 0x1, 0x0, 0x0, 0xc06}, 0xc014) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000003000)='/dev/dlm-monitor\x00', 0x400001, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000030c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000003080)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@loopback, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r10, r11}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x3, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r7}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001}, &(0x7f0000000580)=0x10) ioctl$USBDEVFS_DROP_PRIVILEGES(r1, 0x4004551e, &(0x7f0000000500)=0x8) r12 = getpid() r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r13, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0280cdd5000000000000", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r12], 0x6, 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x72, &(0x7f0000000840)={r5, 0x2, 0x10}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r14, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x8001, 0x0, 0x1]}, 0x5c) 23:30:26 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1}]}) 23:30:26 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1100, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:26 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1}]}) [ 187.482672][T10132] IPVS: ftp: loaded support on port[0] = 21 23:30:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='ns\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4100, 0x0) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000240)={0x0, {0x1, 0x0, 0x8, 0x4}}) epoll_pwait(r2, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x1, &(0x7f0000000080)={[0x9]}, 0x8) fstat(r0, &(0x7f00000002c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x280000, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r4, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x100, 0x1, {0x9, 0x1, 0x20, 0x9}}) 23:30:26 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1200, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:26 executing program 1 (fault-call:2 fault-nth:0): syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:26 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xff00, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 187.704401][T10155] FAULT_INJECTION: forcing a failure. [ 187.704401][T10155] name failslab, interval 1, probability 0, space 0, times 0 [ 187.769537][T10155] CPU: 0 PID: 10155 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 187.778951][T10155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.790112][T10155] Call Trace: [ 187.793507][T10155] dump_stack+0x1fb/0x318 [ 187.798111][T10155] should_fail+0x4b8/0x660 [ 187.802986][T10155] __should_failslab+0xb9/0xe0 [ 187.807946][T10155] ? tomoyo_realpath_from_path+0xe8/0x6b0 [ 187.814205][T10155] should_failslab+0x9/0x20 [ 187.819162][T10155] __kmalloc+0x7a/0x340 [ 187.823336][T10155] ? tomoyo_realpath_from_path+0xdb/0x6b0 [ 187.829320][T10155] ? kfree+0x1f/0x220 [ 187.833621][T10155] tomoyo_realpath_from_path+0xe8/0x6b0 [ 187.839466][T10155] tomoyo_path_number_perm+0x18f/0x690 [ 187.844997][T10155] ? smack_file_ioctl+0x277/0x2e0 [ 187.850108][T10155] tomoyo_file_ioctl+0x23/0x30 [ 187.855223][T10155] security_file_ioctl+0x68/0xd0 [ 187.860443][T10155] __se_sys_ioctl+0x4e/0x190 [ 187.865051][T10155] ? do_syscall_64+0x1d/0x1c0 23:30:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ocfs2(&(0x7f0000000140)='ocfs2\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x3, &(0x7f0000002280)=[{&(0x7f00000001c0)="eeee0d5838b0bc5a40be244aa6a8a201217461257162cacbe83e46ef8bbf05f2aee3b1ce4a02cc5b9e1048fa2d6f7762f152446f713b0c4aa00b0fe7fa1637e238cb02c62a67cc4a74264d7d2ba346a8116153b9bae51a3b18b180046ce93261b592d8e1021ba6aa4a35800beafec1bbb90f969e9aba769eb7eabf94192bfb76ae35b9ca37fd2d7894f4fdad01a81c646f4d666e5cbfdef952f06e9d51dcb52042e0116f1379607525e0", 0xaa, 0x7f}, {&(0x7f0000000280)="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", 0x1000, 0x2acdf6bf}, {&(0x7f0000001280)="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", 0x1000, 0x5}], 0xc000c, &(0x7f0000002300)='$cpuset\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$tipc(r3, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r4 = memfd_create(&(0x7f0000000080)='$\xf7\x97U<1', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r4, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r5, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) fcntl$getownex(r5, 0x10, &(0x7f0000002340)) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') 23:30:26 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 187.870163][T10155] __x64_sys_ioctl+0x7b/0x90 [ 187.875672][T10155] do_syscall_64+0xf7/0x1c0 [ 187.880414][T10155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.886494][T10155] RIP: 0033:0x45c6c9 [ 187.890577][T10155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.911327][T10155] RSP: 002b:00007f6ac4a0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 187.920486][T10155] RAX: ffffffffffffffda RBX: 00007f6ac4a0f6d4 RCX: 000000000045c6c9 [ 187.928827][T10155] RDX: 0000000020000040 RSI: 000000008008551d RDI: 0000000000000004 [ 187.937378][T10155] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.946151][T10155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 187.954555][T10155] R13: 00000000000005d6 R14: 00000000004c8670 R15: 0000000000000000 [ 187.971445][T10155] ERROR: Out of memory at tomoyo_realpath_from_path. [ 187.979771][T10155] usb usb7: usbfs: process 10155 (syz-executor.1) did not claim interface 0 before use 23:30:26 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x2000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 188.051897][T10177] IPVS: ftp: loaded support on port[0] = 21 [ 190.125349][ T0] NOHZ: local_softirq_pending 08 [ 190.765559][ T0] NOHZ: local_softirq_pending 08 [ 190.771146][ T0] NOHZ: local_softirq_pending 08 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x3000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:30 executing program 1 (fault-call:2 fault-nth:1): syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:30 executing program 5: set_mempolicy(0x40000000004003, &(0x7f00000000c0)=0x8, 0xc2) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4000000010000fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028028000100", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB], 0x40}}, 0x0) 23:30:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='ns\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4100, 0x0) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000240)={0x0, {0x1, 0x0, 0x8, 0x4}}) epoll_pwait(r2, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x1, &(0x7f0000000080)={[0x9]}, 0x8) fstat(r0, &(0x7f00000002c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x280000, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r4, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x100, 0x1, {0x9, 0x1, 0x20, 0x9}}) 23:30:30 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$alg(r3, 0x0, 0x0, 0xe26f39c5343f56e8) sendmmsg$alg(r4, &(0x7f00000009c0)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="9ccc7fb10d3c532728dd92f037c8c794757bf2eb1089a77c8fcf24d50635bef84ba7687b965804ed8bddd998428ccfa9feab7fd1b7218f66f53ba4b64175f27902294b6c9b2cb81c6086c6c95f7301959a2e09a9359d6d339d7bd5ba7e471c62927c37d87a3a2cbe71e4a8fd8737682b080b134bc9f3a3f3b0d1595a13a4d734ad3f4d28eaae7b49b92416da1bbf426ea4fbcd195086d067b2e7bbc821bc0d74a34f74d98eeb1163bbd84d0f5a6b7b2116dd27fb1ceb3539fb1a7b44c7b57fb370cb209379db95483c5119162071ab29bf3666e89d479ad6f718b373167bf93cea6eeab5e15fb374f6deb8a1ebd70e07", 0xf0}], 0x1, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x48, 0x8000}, {0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000780)="b3aa6147e55aa8538196b8b8a95302e70f4c8d13ed3a17ab5204e1d16eaff7303f5c8664a4a34664a99d343b803b69aeb1c42ab2def23477946ac44db26f0393cbb2722407dd16f32c180e12778c3ab3d4261f494f37e0529d486285b6b6eb4e0563f3d0b230cafe0b6f43eb1cde31af0a4674f7853489ffcf70e9bee0e1a6a905550b4339d0c2bdb2a3d5526dc606f235edeeebe35baba284fb2703be7b6ecdc868963f89f6c0388bb5ba1b6d920b32cd68d98c54202afb0165a5f91fb6d04394873b4c", 0xc4}, {&(0x7f0000000280)="0a02f9af0cd47c1fbbfe2f1ef57dea17a0bc456dc36c69b21504cd397be0e64c393f8a1f0d5e0465eb7141acaae94881c58270ac678d30784ba0accc2e081d21cca0cdd660276725322a51e6a51a7574b35c3ce0dc24a9d7a0ee340efdd6bd98f2725f22f21fac507f3d454564b979108f14", 0x72}], 0x2, &(0x7f0000000880)=[@assoc={0x18, 0x117, 0x4, 0xd9a}, @iv={0x110, 0x117, 0x2, 0xf9, "bcd591bbf9236a3583687ff1d61419691b54f6a002af55014749a112355fc087ce2c18875bbdeca946510b5b4c4889cfeb964c1d835e6b005809f1f3c83d561966c4ac8d7422569822077e56b0d4fd7bd913299b1bcc3a0888d01cf89419f819d52177fdbd3cc28a305ae5ce170431ecf7fc9a6219f5c9735dd574ecd71d14cdeeb236fe53325aa77742c78974a960ee54bb1ec6e6f03c6229a22aec0ecd71e7076f2c298b8d26c089a81cae556fd25e9dfa636d1db870e10d881ed3a50634b7fe7e8b28ab55e5f8ff1078ecc182f8b614dd1ef07748d9d05ce9874c8db7bc0f895455944f3a24d0ddd8a3f9b3b81d4b67693eda930b845e86"}], 0x128, 0x40}], 0x2, 0x80) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000000)) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000a40)={0xff, 0xc, 0x4, 0x2000, 0x4, {0x77359400}, {0x3, 0x8, 0x40, 0x4, 0x6, 0x7, "bbd0e5fd"}, 0x2f90, 0x2, @offset=0x9, 0x101, 0x0, 0xffffffffffffffff}) setsockopt$RXRPC_SECURITY_KEY(r6, 0x110, 0x1, &(0x7f0000000ac0)='\x00', 0x1) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="7261770000000000000000000000004000000000000000000000000000000000020000000300000068030000f0000000f000000000000000f0000000f0000000d0020000d0020000d0020000d0020000d002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000380071756f746100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007801e00100000000000000000000000000000000000000000801726563656e740000000000000000000000000000000000000000000000010000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000006e657462696f732d6e7300000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffffacdae96a02eea614c5247097e4e87c53ae39c891cd"], 0x1) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:30:30 executing program 0: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r2, 0x100000000) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r3 = syz_open_procfs(r0, &(0x7f0000000000)='net/connector\x00') ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x1e, 0x11, 0xdd, &(0x7f0000000180)="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"}) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000100)={{0x4, @name="2694bd31ce60193509c4468ce7e4ab518298bdf5faa7e1765f9f43dbc9ed990d"}, 0x8, 0x4, 0x3}) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000140)) r5 = socket$netlink(0x10, 0x3, 0x4) fcntl$addseals(r5, 0x409, 0xc) r6 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) r7 = dup2(r4, r6) read$usbfs(r7, &(0x7f0000000040)=""/11, 0xb) 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x4000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 191.091008][T10202] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 191.109854][T10206] FAULT_INJECTION: forcing a failure. [ 191.109854][T10206] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 191.123269][T10206] CPU: 0 PID: 10206 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 191.132052][T10206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.135430][T10202] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified [ 191.142347][T10206] Call Trace: [ 191.142375][T10206] dump_stack+0x1fb/0x318 [ 191.142400][T10206] should_fail+0x4b8/0x660 [ 191.142417][T10206] ? __kasan_check_read+0x11/0x20 [ 191.142437][T10206] should_fail_alloc_page+0x4f/0x60 [ 191.142448][T10206] prepare_alloc_pages+0x283/0x460 [ 191.142467][T10206] __alloc_pages_nodemask+0xb2/0x5d0 [ 191.184816][T10206] kmem_getpages+0x4c/0x930 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x5000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 191.189346][T10206] cache_grow_begin+0x7e/0x2e0 [ 191.194214][T10206] ? cache_alloc_pfmemalloc+0x1e/0x1a0 [ 191.199832][T10206] cache_alloc_refill+0x328/0x400 [ 191.205144][T10206] ? debug_smp_processor_id+0x9/0x20 [ 191.210627][T10206] __kmalloc+0x318/0x340 [ 191.215925][T10206] ? tomoyo_realpath_from_path+0xe8/0x6b0 [ 191.221913][T10206] tomoyo_realpath_from_path+0xe8/0x6b0 [ 191.227509][T10206] tomoyo_path_number_perm+0x18f/0x690 [ 191.233213][T10206] ? smack_file_ioctl+0x277/0x2e0 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 191.238454][T10206] tomoyo_file_ioctl+0x23/0x30 [ 191.243533][T10206] security_file_ioctl+0x68/0xd0 [ 191.248661][T10206] __se_sys_ioctl+0x4e/0x190 [ 191.253359][T10206] ? do_syscall_64+0x1d/0x1c0 [ 191.258112][T10206] __x64_sys_ioctl+0x7b/0x90 [ 191.262820][T10206] do_syscall_64+0xf7/0x1c0 [ 191.267354][T10206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.273591][T10206] RIP: 0033:0x45c6c9 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x7000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 191.277599][T10206] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.297667][T10206] RSP: 002b:00007f6ac4a0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.306185][T10206] RAX: ffffffffffffffda RBX: 00007f6ac4a0f6d4 RCX: 000000000045c6c9 [ 191.314179][T10206] RDX: 0000000020000040 RSI: 000000008008551d RDI: 0000000000000004 [ 191.322269][T10206] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.330262][T10206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 191.338597][T10206] R13: 00000000000005d6 R14: 00000000004c8670 R15: 0000000000000001 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x8000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 191.394105][T10206] usb usb7: usbfs: process 10206 (syz-executor.1) did not claim interface 0 before use 23:30:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, 0x0) syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 23:30:30 executing program 1 (fault-call:2 fault-nth:2): syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x9000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:30 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x0, 0x30}, &(0x7f00000000c0)=0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) [ 191.560513][T10253] FAULT_INJECTION: forcing a failure. [ 191.560513][T10253] name failslab, interval 1, probability 0, space 0, times 0 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xa000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xb000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:30 executing program 0: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r2, 0x100000000) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r3 = syz_open_procfs(r0, &(0x7f0000000000)='net/connector\x00') ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x1e, 0x11, 0xdd, &(0x7f0000000180)="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"}) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000100)={{0x4, @name="2694bd31ce60193509c4468ce7e4ab518298bdf5faa7e1765f9f43dbc9ed990d"}, 0x8, 0x4, 0x3}) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000140)) r5 = socket$netlink(0x10, 0x3, 0x4) fcntl$addseals(r5, 0x409, 0xc) r6 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) r7 = dup2(r4, r6) read$usbfs(r7, &(0x7f0000000040)=""/11, 0xb) 23:30:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, 0x0) syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 23:30:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_WRITE(r4, &(0x7f0000000000)={0x18, 0x0, 0x4, {0x5}}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') sendfile(r0, r5, 0x0, 0x8000000000209) 23:30:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xc000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 191.729636][T10253] CPU: 0 PID: 10253 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 191.738618][T10253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.750136][T10253] Call Trace: [ 191.753552][T10253] dump_stack+0x1fb/0x318 [ 191.758516][T10253] should_fail+0x4b8/0x660 [ 191.763693][T10253] __should_failslab+0xb9/0xe0 [ 191.768758][T10253] ? tomoyo_encode2+0x262/0x580 [ 191.773623][T10253] should_failslab+0x9/0x20 [ 191.778751][T10253] __kmalloc+0x7a/0x340 [ 191.783072][T10253] tomoyo_encode2+0x262/0x580 [ 191.787828][T10253] tomoyo_realpath_from_path+0x65c/0x6b0 [ 191.794072][T10253] tomoyo_path_number_perm+0x18f/0x690 [ 191.800007][T10253] ? smack_file_ioctl+0x277/0x2e0 [ 191.805155][T10253] tomoyo_file_ioctl+0x23/0x30 [ 191.810103][T10253] security_file_ioctl+0x68/0xd0 [ 191.820475][T10253] __se_sys_ioctl+0x4e/0x190 [ 191.825062][T10253] ? do_syscall_64+0x1d/0x1c0 [ 191.829834][T10253] __x64_sys_ioctl+0x7b/0x90 [ 191.834535][T10253] do_syscall_64+0xf7/0x1c0 [ 191.839149][T10253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.845200][T10253] RIP: 0033:0x45c6c9 [ 191.849138][T10253] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.869622][T10253] RSP: 002b:00007f6ac4a0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.878519][T10253] RAX: ffffffffffffffda RBX: 00007f6ac4a0f6d4 RCX: 000000000045c6c9 [ 191.886480][T10253] RDX: 0000000020000040 RSI: 000000008008551d RDI: 0000000000000004 [ 191.894850][T10253] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.903469][T10253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 191.913530][T10253] R13: 00000000000005d6 R14: 00000000004c8670 R15: 0000000000000002 [ 191.926030][T10253] ERROR: Out of memory at tomoyo_realpath_from_path. [ 191.941784][T10253] usb usb7: usbfs: process 10253 (syz-executor.1) did not claim interface 0 before use 23:30:31 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x0, 0x30}, &(0x7f00000000c0)=0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 23:30:31 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) socket$xdp(0x2c, 0x3, 0x0) socket$xdp(0x2c, 0x3, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="210300000000000000000100000008000300162159e348dd083ffb8dd42fd62e024b60da48af851906991fbb4c771796fd9063e1340c0baf2773b25a4cd3c7542a5445194bb973460ecc1e5949904556d6cf3bd442cdf4fed15062347757b88d80d7e5a561cd2fd8c188b21eb0e227992019c3", @ANYRES32, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11810}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x50, r4, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_MESH_CONFIG={0x3c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x71}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x6}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0xfffffffa}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x2bb9}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xdd}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0xd8}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x3f}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x20008040) r5 = socket$inet6(0xa, 0x80003, 0x6b) r6 = socket(0x10, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f0000000040)=0x8, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x304}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e24}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e21}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x7}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e22}, @IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x78}}, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 23:30:31 executing program 1 (fault-call:2 fault-nth:3): syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, 0x0) syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 23:30:31 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_IFLAGS={0x6}]}}}]}, 0x40}}, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='devpts\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 23:30:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, 0x0) syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 23:30:31 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xe000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x6, 0x1}, 0x0, 0x2, 0x6, 0x0, 0x0, 0x800000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x54bb80000000003) ioctl$SNDCTL_DSP_CHANNELS(r2, 0xc0045006, &(0x7f0000000080)=0x4) read$FUSE(r2, &(0x7f00000013c0), 0x1000) [ 192.337642][T10317] FAULT_INJECTION: forcing a failure. [ 192.337642][T10317] name failslab, interval 1, probability 0, space 0, times 0 [ 192.438606][T10317] CPU: 1 PID: 10317 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 192.447441][T10317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.457590][T10317] Call Trace: [ 192.460889][T10317] dump_stack+0x1fb/0x318 [ 192.465322][T10317] should_fail+0x4b8/0x660 [ 192.469853][T10317] __should_failslab+0xb9/0xe0 [ 192.474757][T10317] ? kmalloc_array+0x2f/0x50 [ 192.480659][T10317] should_failslab+0x9/0x20 [ 192.485176][T10317] __kmalloc+0x7a/0x340 [ 192.489440][T10317] kmalloc_array+0x2f/0x50 [ 192.494064][T10317] parse_usbdevfs_streams+0x10e/0x8f0 [ 192.501005][T10317] usbdev_ioctl+0x137f/0x6610 [ 192.506985][T10317] ? do_vfs_ioctl+0x758/0x19d0 [ 192.511897][T10317] ? tomoyo_file_ioctl+0x23/0x30 [ 192.517285][T10317] ? security_file_ioctl+0xb1/0xd0 [ 192.522537][T10317] ? usbdev_poll+0x1f0/0x1f0 [ 192.527192][T10317] __se_sys_ioctl+0x113/0x190 [ 192.531893][T10317] __x64_sys_ioctl+0x7b/0x90 23:30:31 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x10000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 192.536699][T10317] do_syscall_64+0xf7/0x1c0 [ 192.541604][T10317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.548275][T10317] RIP: 0033:0x45c6c9 [ 192.552417][T10317] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.573245][T10317] RSP: 002b:00007f6ac4a0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:30:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6e725f696ef78a65733d4b3300"]) 23:30:31 executing program 1 (fault-call:2 fault-nth:4): syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 192.581772][T10317] RAX: ffffffffffffffda RBX: 00007f6ac4a0f6d4 RCX: 000000000045c6c9 [ 192.589921][T10317] RDX: 0000000020000040 RSI: 000000008008551d RDI: 0000000000000004 [ 192.598026][T10317] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.606105][T10317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 192.614700][T10317] R13: 00000000000005d6 R14: 00000000004c8670 R15: 0000000000000003 23:30:31 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x11000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, 0x0, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x100000, 0x2000020, 0x0, 0x1, 0x4cb, 0x0, 0x89], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000003c0)={'syz1', "326c098ba09653f12426208bca1b73b6cc9b74dc0557c7c55534a8af256d049fc95d8956019f62e5123deff348c9ac1e8c8dea4425eb593ae553a16b71776e265856e74ba33ac7918ad24ae85ba32fb91e22b4b4365d6661d57fd551a0c58bc9b0a7e45fda15c6e48d94632395e5cb4d26db1fb3f3d46f8b3e61eef1099d7c32bdd0fb01fc8cdf72fc15e74c96677c95cb3df807e9489447b0bb1bd4d10b2a74e697af5698aa40e539a3e1aaa7df6c46f3fd9468b0a8c430a2c6f4"}, 0xbf) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 192.788660][T10352] usb usb7: usbfs: process 10352 (syz-executor.1) did not claim interface 0 before use [ 192.841300][T10354] tmpfs: Unknown parameter 'nr_in÷Šes' [ 192.977085][T10361] kvm: pic: single mode not supported [ 192.988442][T10361] kvm: pic: single mode not supported [ 192.999803][T10361] kvm: pic: single mode not supported [ 193.014568][T10361] kvm: pic: single mode not supported [ 193.020194][T10361] kvm: pic: level sensitive irq not supported 23:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffbfffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7573206a58d3652c00"]) 23:30:32 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000800040060000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b5574d71a80c02bf00000000000000000000eaf39ce9000000"], 0x50}}, 0x0) r0 = socket(0x4000000000010, 0x1000000000080002, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x49249249249269c, 0x0) 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x12000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:32 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 193.028955][T10361] kvm: pic: single mode not supported [ 193.170309][T10382] FAT-fs (loop5): Unrecognized mount option "us jXÓe" or missing value [ 193.184851][T10377] usb usb7: usbfs: process 10377 (syz-executor.1) did not claim interface 0 before use 23:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xff000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:32 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x2, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 193.310106][T10382] FAT-fs (loop5): Unrecognized mount option "us jXÓe" or missing value 23:30:32 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x10, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, 0x0, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x100000, 0x2000020, 0x0, 0x1, 0x4cb, 0x0, 0x89], 0x4}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000003c0)={'syz1', "326c098ba09653f12426208bca1b73b6cc9b74dc0557c7c55534a8af256d049fc95d8956019f62e5123deff348c9ac1e8c8dea4425eb593ae553a16b71776e265856e74ba33ac7918ad24ae85ba32fb91e22b4b4365d6661d57fd551a0c58bc9b0a7e45fda15c6e48d94632395e5cb4d26db1fb3f3d46f8b3e61eef1099d7c32bdd0fb01fc8cdf72fc15e74c96677c95cb3df807e9489447b0bb1bd4d10b2a74e697af5698aa40e539a3e1aaa7df6c46f3fd9468b0a8c430a2c6f4"}, 0xbf) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000280)=""/135) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x100000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x200000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 193.716312][T10410] kvm: pic: single mode not supported [ 193.737223][T10410] kvm: pic: single mode not supported [ 193.755178][T10410] kvm: pic: single mode not supported [ 193.761842][T10410] kvm: pic: single mode not supported [ 193.767976][T10410] kvm: pic: level sensitive irq not supported 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x300000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:32 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4c01, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x400000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_RESUME(r1, 0x4147, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="9c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0b000000000000006c00128009000100766c616e000000005c0002800600010000060000040003804c0003800c000100ffffffff090000000c0001007f000000020000000c00010002000000070000000c00010000000000030000200c00010009000000fc0200000c00010004000000faffffff08000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB], 0x9c}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000000c0)={@loopback, 0x4a, r5}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000680)='/dev/l_op#\x00', &(0x7f0000000440)='system\x00', &(0x7f0000000500)='\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='4Mpu\xc6\x1bt\xf0\x00'], &(0x7f00000002c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00', &(0x7f0000000300)='/dev/loop#\x00', &(0x7f0000000100)='\\y\b(,\x00', 0x0]) r6 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x3ff, 0x32c}, @timestamp, @window={0x3, 0x1, 0x2}, @window={0x3, 0x1, 0xfff7}, @timestamp], 0x5) 23:30:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000200)={0x2, 0xa, 0x4, 0x1000000, 0x1, {}, {0x4, 0xc, 0x4, 0x81, 0x5, 0x1, "00608012"}, 0x100, 0x2, @userptr=0x1, 0x3f, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000280)={0x2, 0x2, 0x5, 0x2, 0x94}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) r8 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r8, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000200012800b00010065727370616e0000100002800400120006000200000000000a6d89082c73f4232d9ec67f6cb2447c08f1903bb4af959858eace0f1fc195da13db13d7ed02485fd32929cc6d6fc930f1a7833a8d274cc9d6c7d1a49572afe8448fbae9fa40160ebca43d3dd49f5ad429f925fb7a9cca32b95de5de6ff449be0e3409b91c00d83e88cddb96a93d117f3dff600165a807e2e7dccebd2b31032d6707744ae66f48156f92269b459ea567218556fffc2211c2b869e2d455530af972b6298cff6238e5485b4e1875c840"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r9 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f0000000000)=0x80, 0x80800) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') r11 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x240000, 0x0) fcntl$setflags(r11, 0x2, 0x1) r12 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x406241, 0x0) sendmsg$TIPC_NL_PUBL_GET(r9, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x44040}, 0xc, &(0x7f0000000640)={&(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x20000001) socket$nl_route(0x10, 0x3, 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000540)) sendmsg$IPVS_CMD_GET_DAEMON(r9, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000940)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x404c044}, 0x400c010) ioctl$SNDRV_TIMER_IOCTL_GINFO(r12, 0xc0f85403, &(0x7f0000000400)={{0x1, 0x1, 0x10001, 0x2, 0x3000000}, 0x8000, 0x80000000, 'id1\x00', 'timer0\x00', 0x0, 0x7fff, 0x4, 0x1, 0x7}) 23:30:32 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x500000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:32 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x541b, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0xff, 0x7, 0x4, 0x10000, 0xfffffff7, {}, {0x4, 0x1, 0x40, 0x8d, 0x9, 0x9, "cfd04413"}, 0xffff8001, 0x3, @userptr=0x5, 0x6, 0x0, r3}) 23:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5421, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:33 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x600000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 193.784773][T10410] kvm: pic: single mode not supported [ 194.148074][T10454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:30:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="48000000100000020200"/20, @ANYRES32=r2, @ANYBLOB="8000000000000000280012800e000100697036677265746170000000140002800800f6ff0000d9b708000d100000"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x48c4) 23:30:33 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x700000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 194.247699][T10454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.270912][T10454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:30:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5450, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 194.350370][T10454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:30:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$isdn_base(0x22, 0x3, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000000)={0xfe}) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000300)={0x1, 0x1, 0x1000, 0x79, &(0x7f0000000200)="5f8808506d00020000a76a4179fc7000a1c1d707e09f786adef438817b7309d4cdcebb78c4b294ac125dc1a4a56ad0de4711747c222cd7c0bb433f583160a0a1d996eafe152449ded8db2f55fd39", 0x0, 0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r7 = dup(r6) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000080)=0x4) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 194.393509][T10454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.446916][T10514] cgroup: fork rejected by pids controller in /syz3 [ 194.468240][T10454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.480828][T10454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.493432][T10454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.503824][T10454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.516978][T10454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.529354][T10454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.540054][T10454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:30:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$isdn_base(0x22, 0x3, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000000)={0xfe}) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000300)={0x1, 0x1, 0x1000, 0x79, &(0x7f0000000200)="5f8808506d00020000a76a4179fc7000a1c1d707e09f786adef438817b7309d4cdcebb78c4b294ac125dc1a4a56ad0de4711747c222cd7c0bb433f583160a0a1d996eafe152449ded8db2f55fd39", 0x0, 0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r7 = dup(r6) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000080)=0x4) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:30:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5451, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:33 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x800000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$isdn_base(0x22, 0x3, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000000)={0xfe}) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000300)={0x1, 0x1, 0x1000, 0x79, &(0x7f0000000200)="5f8808506d00020000a76a4179fc7000a1c1d707e09f786adef438817b7309d4cdcebb78c4b294ac125dc1a4a56ad0de4711747c222cd7c0bb433f583160a0a1d996eafe152449ded8db2f55fd39", 0x0, 0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r7 = dup(r6) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000080)=0x4) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:30:34 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5452, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) 23:30:34 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5460, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:34 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x900000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'virt_wifi0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010000fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000002000129832cbc8800800010068737200140002900800010093219cdbe36a8945f97e421694813fab46eec6b91fc126a00fa13ed2d7c95de9199508bed745d3715fc20105670f440d02b3eaefd2300451102144f36539daf2f22de8fc37e80d32c7ed9f7fcf744459e9b117115ab5a70abba05497f75a938ce4f6641f0a114656f48289365a62375c770e5d3a5c831c4900aafd0110b1b6dccf0a7459cc6e123d21ea09e9073a302f88a7021176a49a98e5d7a8e2478016502fc0c3e3484f28dfe3acd022ba8dbbe9ffd9b7dae06c93cbfb641e974e16d3a02efeb2a23835aed25050b70df42a70cf6a05d817ac", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r1, @ANYBLOB], 0x40}}, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x410a00, 0x0) r8 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0xa000, 0x0) lseek(r10, 0x7fff, 0x0) r11 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket(0x10, 0x80002, 0xc) ioctl$SG_GET_RESERVED_SIZE(r10, 0x2272, &(0x7f0000000440)) sendmmsg$alg(r12, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r13 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r13, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x48, r8, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x1, r13}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000014}, 0x4000080) 23:30:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) 23:30:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000002, 0x52000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0xffffffffffffffff, 0x100, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002020a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 23:30:34 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xa00000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:34 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x550b, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:30:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) 23:30:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) [ 195.708798][T10857] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 23:30:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:34 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5514, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:34 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xb00000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 195.862473][T10822] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 195.905545][T10857] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.910764][T10822] minix_free_inode: bit 1 already cleared 23:30:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="24000000140081563e060804001000001015014e7906a6bd00"/36, 0x24}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sysfs$2(0x2, 0x3, &(0x7f0000000180)=""/235) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) r5 = gettid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) dup(0xffffffffffffffff) tgkill(r5, r6, 0x13) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000100)={0x7fff, 0x1, 0x4, 0x20000, 0x0, {0x77359400}, {0x5, 0x2, 0xe1, 0x1, 0x65, 0x3, "832b4902"}, 0xac6b, 0x1, @planes=&(0x7f0000000080)={0x10001, 0x80000001, @mem_offset=0x101, 0x3}, 0x8, 0x0, r2}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) capget(&(0x7f0000000300)={0x19980330, r7}, &(0x7f0000000340)={0x40, 0x3, 0x2, 0x3ff, 0x81, 0x6}) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r8 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x282242) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) 23:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:35 executing program 4: connect$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x3, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x108) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0xb4, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x80, 0x12, 0x0, 0x1, @ip6vti={{0xb, 0x1, 'ip6vti\x00'}, {0x70, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x14, 0x4, @local}, @IFLA_VTI_LOCAL={0x14, 0x4, @loopback}, @IFLA_VTI_LOCAL={0x14, 0x4, @remote}, @IFLA_VTI_REMOTE={0x14, 0x5, @mcast1}, @vti_common_policy=[@IFLA_VTI_FWMARK={0x8, 0x6, 0x1000}], @IFLA_VTI_LOCAL={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0xb4}}, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x6, 0x4) 23:30:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x551f, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:35 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xc00000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5521, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) [ 196.224828][T11075] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) [ 196.229755][T11078] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 23:30:35 executing program 2: r0 = getpid() sched_getparam(r0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) 23:30:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5522, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:35 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd00000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 196.497128][T11194] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 23:30:35 executing program 4: connect$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x3, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x108) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0xb4, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x80, 0x12, 0x0, 0x1, @ip6vti={{0xb, 0x1, 'ip6vti\x00'}, {0x70, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x14, 0x4, @local}, @IFLA_VTI_LOCAL={0x14, 0x4, @loopback}, @IFLA_VTI_LOCAL={0x14, 0x4, @remote}, @IFLA_VTI_REMOTE={0x14, 0x5, @mcast1}, @vti_common_policy=[@IFLA_VTI_FWMARK={0x8, 0x6, 0x1000}], @IFLA_VTI_LOCAL={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0xb4}}, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x6, 0x4) 23:30:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5523, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:35 executing program 2: r0 = getpid() sched_getparam(r0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) 23:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x6364, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 196.748041][T11291] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 23:30:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:35 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xe00000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:35 executing program 2: r0 = getpid() sched_getparam(r0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) 23:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:35 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) recvmmsg(r1, &(0x7f00000006c0), 0x0, 0x0, 0x0) 23:30:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket(0xa, 0x80000, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7) setresuid(0x0, r4, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r5, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r6 = dup2(r2, r5) bind$bt_hci(r6, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x6) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) read$char_usb(r8, &(0x7f0000000000)=""/20, 0x14) 23:30:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:36 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) recvmmsg(r1, &(0x7f00000006c0), 0x0, 0x0, 0x0) 23:30:36 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8912, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:36 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1000000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:36 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8914, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000450000300000000000219078ac141400ac1414bb0324907800000000450000000000000000870000ac1e0001ac141400bed81d85b5b340de75d4f9ac7216887df259b23ff28f04c92d5d0bee66f86dfbb9e610864407dab4667f79b98e431dc5d58ee7a6724b2d446a553f4198d9921967c82b39a28724bbdc4e50bc48bf"], 0x3a) 23:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:36 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:36 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1100000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket(0xa, 0x80000, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7) setresuid(0x0, r4, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r5, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r6 = dup2(r2, r5) bind$bt_hci(r6, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x6) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) read$char_usb(r8, &(0x7f0000000000)=""/20, 0x14) 23:30:36 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8933, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:36 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:36 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1200000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:36 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:36 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x400454ca, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:37 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550c, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:37 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xff00000000000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x2, 0x7}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200201, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup2(r1, r1) shutdown(r2, 0x0) recvmmsg(r2, &(0x7f0000000000), 0x4000223, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r6, 0x4008af13, &(0x7f00000001c0)={0x3, 0xfffffff7}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r8, 0x4004743b, &(0x7f0000000200)=0x7) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:30:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:37 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xffffffff00000000, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d2501b70286db4b3fde7a5f9a10e82c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fe"], 0x34) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:38 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x2, 0x7}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200201, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup2(r1, r1) shutdown(r2, 0x0) recvmmsg(r2, &(0x7f0000000000), 0x4000223, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r6, 0x4008af13, &(0x7f00000001c0)={0x3, 0xfffffff7}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r8, 0x4004743b, &(0x7f0000000200)=0x7) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:30:38 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x2, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:38 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004551e, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:38 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x3, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:38 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x40047451, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x2, 0x7}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200201, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup2(r1, r1) shutdown(r2, 0x0) recvmmsg(r2, &(0x7f0000000000), 0x4000223, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r6, 0x4008af13, &(0x7f00000001c0)={0x3, 0xfffffff7}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r8, 0x4004743b, &(0x7f0000000200)=0x7) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:30:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:38 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:39 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x4, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:39 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x40049409, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:39 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:39 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4008550c, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:39 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x6, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:39 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:39 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x7, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:39 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:40 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4008550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:40 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x8, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x7b) 23:30:40 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x40085511, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, 0x0, 0x0) 23:30:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:40 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x40186366, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x9, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, 0x0, 0x0) 23:30:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4020940d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, 0x0, 0x0) 23:30:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:40 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xa, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:40 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x41045508, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}, {0x20, 'eth1'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x77) 23:30:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x800454d2, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xb, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}, {0x20, 'proceth0self\xf3em1('}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x72) 23:30:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:41 executing program 4: syz_open_dev$usbfs(0x0, 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80045503, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}, {}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x60) 23:30:41 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xc, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:41 executing program 4: syz_open_dev$usbfs(0x0, 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}, {0x20, '#! '}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x5f) 23:30:41 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80045505, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 202.827350][T13325] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #0 23:30:41 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xd, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}, {}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x5b) 23:30:41 executing program 4: syz_open_dev$usbfs(0x0, 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 202.886068][T13327] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #0 23:30:41 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}, {}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x5a) 23:30:42 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xe, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:42 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80045510, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x59) 23:30:42 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:42 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80045515, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:42 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x48) 23:30:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:42 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80045518, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x48) 23:30:42 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:42 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8660000"}, 0x48) 23:30:42 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80045519, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x13, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:42 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}]}, 0x1c) 23:30:43 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8004551a, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:43 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}]}, 0x1c) 23:30:43 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x14, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:43 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80085504, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}]}, 0x1c) 23:30:43 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 204.337893][T13958] usb usb7: usbfs: process 13958 (syz-executor.1) did not claim interface 0 before use [ 204.396494][T14048] usb usb7: usbfs: process 14048 (syz-executor.1) did not claim interface 0 before use 23:30:43 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:43 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008550e, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000"}, 0x3b) 23:30:43 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x4004550d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000"}, 0x3b) 23:30:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:43 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551c, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x4004550d, 0x0) 23:30:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000"}, 0x3b) 23:30:43 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x16, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:43 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000931c626cd01ba4e79c2b59", @ANYRES32, @ANYBLOB="00000000060000009500000000000000"], 0x0, 0x56, 0x89, &(0x7f0000000680)=""/137, 0x41100, 0x3, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) socketpair(0x2, 0xa, 0x8, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f00000002c0), 0x4) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000a00), 0x4) write$cgroup_int(r8, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={&(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2780, 0x0, [], r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0x0, 0x101, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x0, 0x2e15579, 0x3f, 0x1, r8, 0x0, [], r11, 0xffffffffffffffff, 0x5}, 0x3c) 23:30:43 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x80086301, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb4"}, 0x4a) 23:30:44 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x17, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) 23:30:44 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8010550e, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) [ 205.082676][T14318] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 23:30:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb4"}, 0x4a) 23:30:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, 0x0, 0x0) 23:30:44 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb4"}, 0x4a) 23:30:44 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x18, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, 0x0, 0x0) 23:30:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501886400de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 23:30:44 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8038550a, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce874339"}, 0x52) 23:30:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r2, 0x0, 0x0) 23:30:44 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x19, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce874339"}, 0x52) 23:30:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:44 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8108551b, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce874339"}, 0x52) 23:30:45 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x21, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:45 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0045878, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8"}, 0x56) 23:30:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501886400de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 23:30:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:45 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x22, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:45 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0045878, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8"}, 0x56) 23:30:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe8"}, 0x56) 23:30:45 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc004743e, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:45 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe86600"}, 0x58) 23:30:45 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc00c5512, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x88, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x10000}, 0x3c) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) 23:30:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe86600"}, 0x58) 23:30:45 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0105500, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) 23:30:46 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x30, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'\\$.ppp0\x06\x00system'}], 0xa, "39980cfd42119cc4e103030000000000495b3c3dd8b515b9316a4000000000fffd0000fa0c6e1fc7f28fc8a47fb49388a92fce87433932b5bbe86600"}, 0x58) 23:30:46 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0105502, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:30:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="2e00000032000908d22780258c6394fb0124fc0e10000b500c000200053582c137153e3709f3008025643000d1bd", 0x2e}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000140)=0x7) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)=0xffffffff000) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x50, 0x20, 0x7f, 0x3f, 0x0, 0x8, 0x0, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x30000, 0x5, 0xd3, 0x4, 0x101, 0x3507013}, r0, 0xf, r1, 0x3) socket$kcm(0x2, 0x3, 0x2) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000700)={'macsec0\x00', @local}) 23:30:46 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x31, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x88, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x10000}, 0x3c) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) [ 207.348199][T15175] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 207.432790][T15175] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 23:30:46 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0105512, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:46 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x32, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 207.502819][T15187] device veth1_macvtap left promiscuous mode 23:30:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:30:46 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0185500, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10e, 0x2, 0xffffffffffffffff, 0x204) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000680)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x3}}, 0x10, 0x0}, 0x0) 23:30:46 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 23:30:46 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0185502, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:47 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x108, 0x8000}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 23:30:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:47 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:47 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x44, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:47 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:47 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="820201f0ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = socket(0x2, 0x2, 0x0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x25a, 0x0, 0xb9, 0x0, 0xfef71086ce4d2d2}, 0x0) 23:30:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:47 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x1, 0x1}]}) 23:30:47 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x60, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 208.612108][T15764] usb usb7: usbfs: process 15764 (syz-executor.1) did not claim interface 0 before use 23:30:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) [ 208.761294][T15789] usb usb7: usbfs: process 15789 (syz-executor.1) did not claim interface 0 before use 23:30:47 executing program 5: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') 23:30:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:47 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x2, 0x1, [{0x1, 0x1}]}) 23:30:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:47 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:48 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/vmallocinfo\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 209.111246][T15899] usb usb7: usbfs: process 15899 (syz-executor.1) did not claim interface 0 before use [ 209.146967][T15902] usb usb7: usbfs: process 15902 (syz-executor.1) did not claim interface 0 before use 23:30:48 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x3, 0x1, [{0x1, 0x1}]}) 23:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:48 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x2}, &(0x7f0000000040)=0x1e) [ 209.404357][T16018] usb usb7: usbfs: process 16018 (syz-executor.1) did not claim interface 0 before use 23:30:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) umount2(0x0, 0x1f) [ 209.470487][T16023] usb usb7: usbfs: process 16023 (syz-executor.1) did not claim interface 0 before use 23:30:48 executing program 5: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x400000000000, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) 23:30:48 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x4, 0x1, [{0x1, 0x1}]}) 23:30:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) umount2(0x0, 0x1f) [ 209.748795][T16144] usb usb7: usbfs: process 16144 (syz-executor.1) did not claim interface 0 before use 23:30:48 executing program 5: getpgrp(0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000640)='./file0\x00', 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000640)='./file0/file0\x00', 0x0) 23:30:48 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x3}, &(0x7f0000000040)=0x1e) 23:30:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 209.870086][T16155] usb usb7: usbfs: process 16155 (syz-executor.1) did not claim interface 0 before use 23:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) umount2(0x0, 0x1f) 23:30:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:49 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(0x0) 23:30:49 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x5, 0x1, [{0x1, 0x1}]}) 23:30:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:49 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x4}, &(0x7f0000000040)=0x1e) 23:30:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000), 0xe) [ 210.251673][T16281] usb usb7: usbfs: process 16281 (syz-executor.1) did not claim interface 0 before use 23:30:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(0x0, 0x1f) [ 210.342600][T16290] usb usb7: usbfs: process 16290 (syz-executor.1) did not claim interface 0 before use 23:30:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:49 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x6, 0x1, [{0x1, 0x1}]}) 23:30:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) wait4(0x0, 0x0, 0x0, 0x0) 23:30:49 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x5}, &(0x7f0000000040)=0x1e) 23:30:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) [ 210.620485][T16414] usb usb7: usbfs: process 16414 (syz-executor.1) did not claim interface 0 before use 23:30:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 210.675472][T16506] usb usb7: usbfs: process 16506 (syz-executor.1) did not claim interface 0 before use 23:30:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:49 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x6}, &(0x7f0000000040)=0x1e) 23:30:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000001c0)={r8}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000001c0)={r8}, 0x8) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000100)={{0x1, 0x0, @identifier="a52264d9b40ba2e92abe81fb51787a88"}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000080)={r9}) r10 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r10, 0x0, 0x0, 0x4008066, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x3f) sendto$inet6(r10, &(0x7f0000001440)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3cac9597410be0aacbb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e4fd99e3200119d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b0df1a7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ebffcf9ade407dfb50948aa97077a195b5f6eeff443be20f383aa8ebbb4b0f2e888cb7cde9ec09177f4576576f088430e4a61d352607113ce7118f2d0000000000000000", 0x566, 0xc041, 0x0, 0x0) sendto$inet6(r10, &(0x7f0000000240)="f11d9485945532b02c13b63ecca90bcd5e45aae6c27dcfb60d8f3b82d09721908ec5fd0cd4fc40b461afc79758bb2ebb7ba7e67fc49a3d4bb896b2", 0x3b, 0x10008000, 0x0, 0x0) sendto$inet6(r10, &(0x7f0000000000)="c5f4cbae2a00003a9c13", 0xc, 0x260000cc, 0x0, 0xffffff88) 23:30:49 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x7, 0x1, [{0x1, 0x1}]}) 23:30:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) [ 210.932787][T16601] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:30:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:49 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x7}, &(0x7f0000000040)=0x1e) [ 210.987513][T16649] usb usb7: usbfs: process 16649 (syz-executor.1) did not claim interface 0 before use [ 211.025493][T16652] usb usb7: usbfs: process 16652 (syz-executor.1) did not claim interface 0 before use 23:30:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:50 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x150) r1 = gettid() tkill(r1, 0xe) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 23:30:50 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x8, 0x1, [{0x1, 0x1}]}) 23:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:50 executing program 5: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) [ 211.223869][T16707] usb usb7: usbfs: process 16707 (syz-executor.1) did not claim interface 0 before use [ 211.262234][T16735] usb usb7: usbfs: process 16735 (syz-executor.1) did not claim interface 0 before use 23:30:50 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x8}, &(0x7f0000000040)=0x1e) 23:30:50 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x9, 0x1, [{0x1, 0x1}]}) 23:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:50 executing program 5: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) [ 211.491914][T16797] usb usb7: usbfs: process 16797 (syz-executor.1) did not claim interface 0 before use 23:30:50 executing program 5: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) [ 211.579868][T16905] usb usb7: usbfs: process 16905 (syz-executor.1) did not claim interface 0 before use 23:30:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@dev, @multicast1, @multicast1}, 0xc) 23:30:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:50 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x9}, &(0x7f0000000040)=0x1e) 23:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:50 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xa, 0x1, [{0x1, 0x1}]}) 23:30:50 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) [ 211.821616][T16923] usb usb7: usbfs: process 16923 (syz-executor.1) did not claim interface 0 before use 23:30:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:50 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) [ 211.880910][T16931] usb usb7: usbfs: process 16931 (syz-executor.1) did not claim interface 0 before use 23:30:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:50 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:51 executing program 2: 23:30:51 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xb, 0x1, [{0x1, 0x1}]}) 23:30:51 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0xa}, &(0x7f0000000040)=0x1e) 23:30:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:51 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:51 executing program 2: [ 212.186680][T17058] usb usb7: usbfs: process 17058 (syz-executor.1) did not claim interface 0 before use [ 212.293812][T17130] usb usb7: usbfs: process 17130 (syz-executor.1) did not claim interface 0 before use 23:30:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:51 executing program 2: 23:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:51 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0xb}, &(0x7f0000000040)=0x1e) 23:30:51 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:51 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xc, 0x1, [{0x1, 0x1}]}) 23:30:51 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x3, @none, 0x0, 0x1}, 0xe) 23:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(0x0, 0x1f) 23:30:51 executing program 2: [ 212.546831][T17231] usb usb7: usbfs: process 17231 (syz-executor.1) did not claim interface 0 before use 23:30:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:51 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0xc}, &(0x7f0000000040)=0x1e) [ 212.633484][T17301] usb usb7: usbfs: process 17301 (syz-executor.1) did not claim interface 0 before use 23:30:51 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) 23:30:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) umount2(0x0, 0x1f) 23:30:51 executing program 2: 23:30:51 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xd, 0x1, [{0x1, 0x1}]}) 23:30:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:51 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) 23:30:51 executing program 2: 23:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) umount2(0x0, 0x1f) [ 212.924287][T17426] usb usb7: usbfs: process 17426 (syz-executor.1) did not claim interface 0 before use 23:30:51 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0xd}, &(0x7f0000000040)=0x1e) [ 212.975978][T17436] usb usb7: usbfs: process 17436 (syz-executor.1) did not claim interface 0 before use 23:30:52 executing program 2: 23:30:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) umount2(0x0, 0x1f) 23:30:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) 23:30:52 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xe, 0x1, [{0x1, 0x1}]}) 23:30:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:52 executing program 2: 23:30:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x0) 23:30:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 23:30:52 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0xe}, &(0x7f0000000040)=0x1e) [ 213.257427][T17559] usb usb7: usbfs: process 17559 (syz-executor.1) did not claim interface 0 before use 23:30:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 213.327408][T17565] usb usb7: usbfs: process 17565 (syz-executor.1) did not claim interface 0 before use 23:30:52 executing program 2: 23:30:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x0) 23:30:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 23:30:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:52 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x10, 0x1, [{0x1, 0x1}]}) 23:30:52 executing program 2: 23:30:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 23:30:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x0) 23:30:52 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x10}, &(0x7f0000000040)=0x1e) [ 213.646703][T17682] usb usb7: usbfs: process 17682 (syz-executor.1) did not claim interface 0 before use 23:30:52 executing program 2: 23:30:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none}, 0xe) [ 213.738686][T17701] usb usb7: usbfs: process 17701 (syz-executor.1) did not claim interface 0 before use 23:30:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:52 executing program 2: 23:30:52 executing program 4: 23:30:52 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x11, 0x1, [{0x1, 0x1}]}) 23:30:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none}, 0xe) 23:30:52 executing program 2: 23:30:52 executing program 4: 23:30:52 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x11}, &(0x7f0000000040)=0x1e) 23:30:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 214.067459][T17825] usb usb7: usbfs: process 17825 (syz-executor.1) did not claim interface 0 before use 23:30:53 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3, @none}, 0xe) 23:30:53 executing program 4: 23:30:53 executing program 2: 23:30:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:53 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x12, 0x1, [{0x1, 0x1}]}) 23:30:53 executing program 4: 23:30:53 executing program 2: mlockall(0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'broute\x00'}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 23:30:53 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00', 0x12}, &(0x7f0000000040)=0x1e) 23:30:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 214.376035][T17955] usb usb7: usbfs: process 17955 (syz-executor.1) did not claim interface 0 before use 23:30:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@filestreams='filestreams'}, {@pquota='pquota'}]}) 23:30:53 executing program 4: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x6, 0x80000000000003, 0x3}, 0x2c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x800, r0}, 0x38) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6611, 0x0) [ 214.497860][T17964] usb usb7: usbfs: process 17964 (syz-executor.1) did not claim interface 0 before use 23:30:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000100)={0x0, 0x5}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r3, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000980)="c0", 0x1}], 0x3) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2d1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) syz_genetlink_get_family_id$ethtool(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 23:30:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:53 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x1d, 0x1, [{0x1, 0x1}]}) [ 214.625105][T17972] XFS (loop5): Invalid superblock magic number 23:30:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 214.767096][T18042] usb usb7: usbfs: process 18042 (syz-executor.1) did not claim interface 0 before use 23:30:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:53 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x2000001e) [ 214.840261][T18096] usb usb7: usbfs: process 18096 (syz-executor.1) did not claim interface 0 before use [ 214.849495][T18007] kvm: emulating exchange as write 23:30:53 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x25, 0x1, [{0x1, 0x1}]}) [ 215.093615][T18187] usb usb7: usbfs: process 18187 (syz-executor.1) did not claim interface 0 before use [ 215.122970][T18209] usb usb7: usbfs: process 18209 (syz-executor.1) did not claim interface 0 before use 23:30:54 executing program 2: mlockall(0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'broute\x00'}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 23:30:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:54 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0x5}, 0x16, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat(r3, &(0x7f0000000180)='./file0\x00', 0x68ac0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x7, 0x1, 0xfe, 0x0, 0x7fff, 0x4000a, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x3}, 0x200, 0x2, 0xfff, 0x5, 0x4, 0x1, 0xfff}, r5, 0xffffffffffffffff, r7, 0x3) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='vxcan1\x00'}) 23:30:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000100)={0x0, 0x5}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r3, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000980)="c0", 0x1}], 0x3) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2d1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) syz_genetlink_get_family_id$ethtool(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 23:30:54 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x48, 0x1, [{0x1, 0x1}]}) 23:30:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mlockall(0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x44000005}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 23:30:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 215.683737][T18246] usb usb7: usbfs: process 18246 (syz-executor.1) did not claim interface 0 before use 23:30:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 215.755250][T18253] usb usb7: usbfs: process 18253 (syz-executor.1) did not claim interface 0 before use 23:30:54 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x4c, 0x1, [{0x1, 0x1}]}) 23:30:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000100)={0x0, 0x5}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r3, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000980)="c0", 0x1}], 0x3) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2d1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) syz_genetlink_get_family_id$ethtool(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 23:30:54 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000240)={@remote={[], 0x0}, 0x4, 'macsec0\x00'}) r3 = msgget$private(0x0, 0x240) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000100)=""/230) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = eventfd2(0x81, 0x800) r5 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendmsg$inet(r5, &(0x7f00000009c0)={&(0x7f0000000680)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@ip_tos_u8={{0x11}}], 0x18}, 0x0) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x92c, 0x4}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r8, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x4}, 0xfffffffffffffffb) [ 216.027387][T18365] usb usb7: usbfs: process 18365 (syz-executor.1) did not claim interface 0 before use [ 216.126742][T18372] usb usb7: usbfs: process 18372 (syz-executor.1) did not claim interface 0 before use 23:30:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) clone(0xdff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f00000011c0), 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:55 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x5c, 0x1, [{0x1, 0x1}]}) 23:30:55 executing program 3: clone(0x2000000082040100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000080)=0xf8, 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000100)={0x0, 0x5}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r3, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000980)="c0", 0x1}], 0x3) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2d1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) syz_genetlink_get_family_id$ethtool(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 23:30:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="cb56b6be0407002b89d55cac2ca31c2d", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x8dffffff, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000080)="5531f5e79d1230ddde98e2f96ff18ba1390fc35e67d75c5a6808890339fb4c7d", 0x320}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e101b8da27a3185d39bb2f03d0a65a822100b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x3c0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x2fb80}], 0x1}}], 0x2, 0x0) 23:30:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 216.905180][T18503] usb usb7: usbfs: process 18503 (syz-executor.1) did not claim interface 0 before use [ 216.928463][T18509] usb usb7: usbfs: process 18509 (syz-executor.1) did not claim interface 0 before use 23:30:55 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x60, 0x1, [{0x1, 0x1}]}) 23:30:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:56 executing program 5: clone(0x3106001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') r1 = gettid() r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) tkill(r1, 0xd) dup2(r2, r0) [ 217.071093][T18564] usb usb7: usbfs: process 18564 (syz-executor.1) did not claim interface 0 before use 23:30:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 217.144081][T18610] usb usb7: usbfs: process 18610 (syz-executor.1) did not claim interface 0 before use 23:30:56 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) socketpair(0x1d, 0x3, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000001c0)={r4}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x4}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r5, 0x1d, 0x18, "744eb5cdde2c52a0cb42cc260770b1135ab00e433c4aa3a7"}, 0x20) [ 217.281282][ T23] audit: type=1326 audit(1581895856.216:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=18512 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f50a code=0xffff0000 23:30:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000013c0)=[{&(0x7f00000014c0)="c4553134deac12a50aa3bb829c8153b1497d516ec8929415d1a6bb16c31ffbc0a828d296c3ccfa6e917cbe82d9b15678dae5af8344c5441293187453e55f5ab1ad4e25331680514e7cb7dac536b8d950a0e8e88b62b3f8d4369ccd944c2067b8c3165545611ab5ffd195ff0a0167b762489e6925422c06acc208fba46015fdc45ef477f8355c5cd2ea4dc93521bb563ecf3b90ab333a3bc69d7d82ea866b1bf11628495ae4e40332eac943f64b871665011f50f47348b989e1e9a1bf128074c849e8c7b0ebd1d20f986efe9234c20c84b1d0dff2fface9b5077a545fb87eb73a8667134ee1e9c7c69332a0f457f639fdc13a3384077dffbf728e946baa42dd8cf54b6059a62e1651113599a21dadaa5b73fda761db265c0ca38eefaec30f5fbb740a28f9a68f4eaf48d109c5af310961dc919165d6a07be341ed2f965f4916ee61ebf887a98710829c5a3267c6b1a244d8cb9a0e7931151a63d66f54ce7d7e3a652cf360637d3a8016a0e609ba5a2b4b420595e93aa24d4599c9b469f7a9911c13a45be5b66eab6d4def0210bceb5d8427aed9048c689eb334fc2f2796a2e83260230d5e7b95b2ab969b41b25d85037fd194fd39759024623c80e0c3241c5bc53e48b6058d89675350015d539482266cfe6938883b66cf34d11a09297ba20e3de24fe27ed949225c14581d805fb99bd02f853ce705dc48501f9bc7d912e4b94da31cc2360feed66d28664a8048556a0aa8821b9bc960e41cd44f2bcdcd84c677330b58a4a888615f995fac1361a3efd6bd4cc48121edf37c08b8d10f0434f9962ea3f586c19c657739c97765c2eb9c42b2a07227c6b8b58275fb372fbbac88669a090078bb8bd720bd1f590cd6222ec8b8b79abbf3f8930c26d2b7aa29b51bd474149c59b63510dec2574c8d1b4e216c01c2289faafa803f86c142e770179d0bd34ce2f084ddb71b6a0ec165df6ff3891a49ae7012746ae94864308ed2c43ec69526da5e542b8ff6f73b8ae12adb7fa364a86ef8329335295c4ca5bd689147856175626de59739b9819b50", 0x2eb}], 0x1) 23:30:56 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x68, 0x1, [{0x1, 0x1}]}) 23:30:56 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000402) finit_module(r0, 0x0, 0x0) 23:30:56 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x20}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) r2 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) keyctl$read(0xb, r2, 0x0, 0x0) request_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, r3) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x4, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r4, r5, 0x80000) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 23:30:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:56 executing program 3: clone(0x27090c00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 217.857982][ T23] audit: type=1326 audit(1581895856.796:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=18589 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f50a code=0xffff0000 [ 217.937411][T18759] usb usb7: usbfs: process 18759 (syz-executor.1) did not claim interface 0 before use 23:30:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) [ 217.983310][T18816] usb usb7: usbfs: process 18816 (syz-executor.1) did not claim interface 0 before use 23:30:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 23:30:57 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x6c, 0x1, [{0x1, 0x1}]}) 23:30:57 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x8, 0x5, r0, 0x0, &(0x7f00000000c0)={0x1e31b4d, 0x1f, [], @string=&(0x7f0000000080)=0x3}}) sendmsg$nl_route_sched(r1, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000180)=@deltaction={0x294, 0x31, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x70, 0x1, [{0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7f}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0x14, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}]}, @TCA_ACT_TAB={0x74, 0x1, [{0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x100}}, {0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x14, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0x10, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}]}, @TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xffff43d0}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3abf8fe7}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0x10, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x323}}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4004084}, 0x4010) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) [ 218.126677][ T23] audit: type=1326 audit(1581895857.066:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=18871 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f50a code=0xffff0000 23:30:57 executing program 2: 23:30:57 executing program 2: 23:30:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 218.255986][T18883] usb usb7: usbfs: process 18883 (syz-executor.1) did not claim interface 0 before use 23:30:57 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x100005, 0x44a200) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x2, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000003440)=0x1e) [ 218.330615][T18959] usb usb7: usbfs: process 18959 (syz-executor.1) did not claim interface 0 before use 23:30:57 executing program 2: [ 218.924586][ T23] audit: type=1326 audit(1581895857.866:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=18871 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f50a code=0xffff0000 23:30:58 executing program 4: 23:30:58 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x74, 0x1, [{0x1, 0x1}]}) 23:30:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 23:30:58 executing program 2: 23:30:58 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:30:58 executing program 5: 23:30:58 executing program 2: 23:30:58 executing program 5: [ 219.183815][T19118] usb usb7: usbfs: process 19118 (syz-executor.1) did not claim interface 0 before use 23:30:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:58 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000040)=0x1e) [ 219.253567][T19120] usb usb7: usbfs: process 19120 (syz-executor.1) did not claim interface 0 before use 23:30:58 executing program 2: 23:30:58 executing program 5: 23:30:58 executing program 4: 23:30:58 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x7a, 0x1, [{0x1, 0x1}]}) 23:30:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:58 executing program 5: 23:30:58 executing program 2: 23:30:58 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000080)=0x2, 0x8) [ 219.642634][T19246] usb usb7: usbfs: process 19246 (syz-executor.1) did not claim interface 0 before use 23:30:58 executing program 5: 23:30:58 executing program 2: [ 219.685331][T19254] usb usb7: usbfs: process 19254 (syz-executor.1) did not claim interface 0 before use 23:30:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xe004000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 23:30:58 executing program 4: 23:30:58 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x300, 0x1, [{0x1, 0x1}]}) 23:30:58 executing program 5: 23:30:58 executing program 2: 23:30:58 executing program 4: 23:30:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:30:58 executing program 5: [ 219.961216][T19371] usb usb7: usbfs: process 19371 (syz-executor.1) did not claim interface 0 before use 23:30:59 executing program 2: [ 220.062463][T19378] usb usb7: usbfs: process 19378 (syz-executor.1) did not claim interface 0 before use 23:30:59 executing program 4: 23:30:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:30:59 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x500, 0x1, [{0x1, 0x1}]}) 23:30:59 executing program 5: 23:30:59 executing program 2: 23:30:59 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) r6 = socket(0x10, 0x2, 0x0) sendto(r6, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_DQEVENT(r8, 0x80885659, &(0x7f00000002c0)={0x0, @motion_det}) recvmmsg(r6, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}, 0x5}], 0x34, 0xac0, 0x0) r9 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r6, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="7c000000138e50a1be5365209d97c717705f1f1534d06966ad8338d4ff6addc1fb55b39e9b7b6b8b981edf8d684953d9e0fd7990e500536a62c63f66781d696778927f7c8ae54f9e408d4156eb5334e72ba2118b6df1e37f3dff117ca386befbf5b01c19df513ca52cc5071595e91b83a752b66ecbe1b7cf1357454e", @ANYRES16=r9, @ANYBLOB="00042dbd7000fedbdf250800000006000b000e000000080004000200000008000700ac1414aa14000500fe8000000000000000000000000000bb05000100000000000f0001002d7d235d73797374656d0000050001000000000008000c000200000014000600fe8000000000000000000000000000aa"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x10) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x1) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x9ddc987071848e0b, 0x0) write$FUSE_IOCTL(r10, &(0x7f00000003c0)={0x20, 0x0, 0x3, {0x7, 0x4, 0x787b, 0x9}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000100)={0x0, 0x30314247, 0x3, @discrete={0x1, 0x80000001}}) r11 = shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_STAT(r11, 0x2, &(0x7f0000000400)=""/4096) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000080)={0xe4a2, 0x5, 0x8, {0x7, 0xfffffff9}, 0x1, 0x800}) [ 220.252074][T19390] usb usb7: usbfs: process 19390 (syz-executor.1) did not claim interface 0 before use 23:30:59 executing program 4: 23:30:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 220.310566][T19395] usb usb7: usbfs: process 19395 (syz-executor.1) did not claim interface 0 before use 23:30:59 executing program 5: 23:30:59 executing program 2: 23:30:59 executing program 5: 23:30:59 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x600, 0x1, [{0x1, 0x1}]}) 23:30:59 executing program 4: 23:30:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:30:59 executing program 2: 23:30:59 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @local, 'caif0\x00'}}) socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0xfffffffffffffeba) [ 220.597712][T19513] usb usb7: usbfs: process 19513 (syz-executor.1) did not claim interface 0 before use 23:30:59 executing program 4: [ 220.685163][T19523] usb usb7: usbfs: process 19523 (syz-executor.1) did not claim interface 0 before use 23:30:59 executing program 5: 23:30:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:30:59 executing program 2: 23:30:59 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x700, 0x1, [{0x1, 0x1}]}) 23:30:59 executing program 5: 23:30:59 executing program 4: 23:30:59 executing program 2: 23:30:59 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x2, 0xfb) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$phonet(0x23, 0x2, 0x1) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x4, 0x82080) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r5, 0x408c5333, &(0x7f0000000080)={0x5, 0x9, 0x1, 'queue1\x00'}) 23:30:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:30:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46000) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, &(0x7f0000000100), 0x8080fffffffe) [ 220.980047][T19642] usb usb7: usbfs: process 19642 (syz-executor.1) did not claim interface 0 before use 23:31:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xfffffffffffffffc) 23:31:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) eventfd2(0x0, 0x0) io_setup(0x9, &(0x7f0000000340)=0x0) io_submit(r1, 0x224a, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x8, 0x8, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, r2+10000000}, {0x0, 0x9}}, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 221.091167][T19654] usb usb7: usbfs: process 19654 (syz-executor.1) did not claim interface 0 before use 23:31:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:00 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x8d3, 0x1, [{0x1, 0x1}]}) [ 221.203896][ T23] audit: type=1804 audit(1581895860.146:52): pid=19702 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir127715353/syzkaller.3pTfkP/164/bus" dev="sda1" ino=16785 res=1 23:31:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = creat(0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, 0x0) syz_open_procfs(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000005c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0xfffffffffffffff5, 0x2, {{0x6, 0x0, 0x101, 0x3fffffffc0000, 0x2000, 0x0, {0x1, 0x1f, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x81}}, {0x0, 0x8}}}, 0xa0) clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{0x77359400}}], 0x18) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20004000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES64, @ANYRES16=r3, @ANYRESDEC], 0x3}, 0x1, 0x0, 0x0, 0x880}, 0x20000880) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2282000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="db5235c4cb7e5459b1154dadd055c9ce86d34ba470cc2c3aded8eee395f45c770162b220d717f2a343d11c7611095e38f2505455fbaec811b5c97462f02e039858c04a6b81a5fe9f456dd5d877c9076be2cc3fdbfd57bcae351c2acbefe0a708b625ea69ea4a5106772aae40228736f72e2acee0c4e48900571d8208b3a1d621d98f31ad541acbde1c8afada", @ANYRESDEC=0x0, @ANYRESDEC], 0x3}, 0x1, 0x0, 0x0, 0xb9216b6bd4ff359a}, 0x20040814) socket$inet6_tcp(0xa, 0x1, 0x0) 23:31:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 221.311801][T19771] usb usb7: usbfs: process 19771 (syz-executor.1) did not claim interface 0 before use 23:31:00 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000001c0)={'broute\x00', 0x0, 0x4, 0xe9, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f00000000c0)=""/233}, &(0x7f0000000240)=0x78) [ 221.369256][T19773] usb usb7: usbfs: process 19773 (syz-executor.1) did not claim interface 0 before use 23:31:00 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x8d4, 0x1, [{0x1, 0x1}]}) 23:31:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 221.551222][T19790] usb usb7: usbfs: process 19790 (syz-executor.1) did not claim interface 0 before use 23:31:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{0x77359400}}], 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20004000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x2c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x12}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) [ 221.639315][T19853] usb usb7: usbfs: process 19853 (syz-executor.1) did not claim interface 0 before use [ 221.947808][ T23] audit: type=1804 audit(1581895860.886:53): pid=19747 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir127715353/syzkaller.3pTfkP/164/bus" dev="sda1" ino=16785 res=1 23:31:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = accept(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) creat(0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000700)='/dev/rtc#\x00', 0x2, 0x206301) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0xff, 0x0, 0x0, 0x328556c9, 0xd4500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8bd1}, 0x0, 0xfffffffffffffffe, 0x0, 0x6}, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x3) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x803, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x306, @local}, 0x80) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'veth0_to_bond\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000a80)=0x19f) stat(&(0x7f0000000ac0)='\x00', &(0x7f0000000b00)) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000800)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r7, 0x0) stat(&(0x7f0000000480)='./bus\x00', &(0x7f0000000880)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) openat(0xffffffffffffffff, &(0x7f0000000f40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x30) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) r8 = creat(&(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r8, 0x100000003, 0xfb7d, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xfb7d, 0x0) r9 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r9, 0x7ffffc, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r11 = socket(0x10, 0x80002, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r12, 0x0, r11) r13 = socket(0x10, 0x80002, 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r14, 0x0, r13) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8946, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1808040, &(0x7f0000000d40)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYRESHEX=0x0, @ANYRES16, @ANYRESHEX=0x0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="219f121c4fa8", @ANYPTR64], @ANYRESHEX=r15, @ANYRESDEC, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRESDEC=r4, @ANYPTR, @ANYPTR64]], @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB="0300469e56", @ANYRESDEC=0x0, @ANYBLOB="2cb1c29000e3168202dcfdc7d923bd0c8ceaabd7ae1ebdda39aa27a2f768b25ab536408f854f60bc1151b42c2ed608c8b20ee5540000000000009e230c505d"]) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) write$binfmt_elf64(r10, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000009c0)=ANY=[@ANYRES64=r16]], 0x100bd) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) fsetxattr$system_posix_acl(r4, &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f0000001000)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRES64, @ANYBLOB="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"], 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r17 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r18, 0x407, 0x200006) splice(r17, 0x0, r18, 0x0, 0x55aa40be, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r19, 0x407, 0x200006) fcntl$setpipe(r19, 0x407, 0x0) r20 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r21, 0x407, 0x200006) splice(r20, 0x0, r21, 0x0, 0x55aa40be, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x4e23, 0x8, @mcast1}, {0xa, 0x4e22, 0x10001, @remote, 0x45}, 0x9, [0x0, 0x6ba, 0x80, 0x0, 0x8, 0x14000, 0x0, 0x200]}, 0x5c) 23:31:01 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x900, 0x1, [{0x1, 0x1}]}) 23:31:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x18) 23:31:01 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000180)={0x401, 0x9, &(0x7f0000000080)=[0x3, 0x0, 0x10001, 0x44183206, 0xf8, 0x40, 0xc5, 0x8, 0x800], &(0x7f00000000c0)=[0xfffffff8], &(0x7f0000000100)=[0xffffffff, 0x8, 0x2, 0xffffff87, 0x400, 0x2, 0x7f, 0x4], &(0x7f0000000140)=[0x5, 0x20, 0x3f, 0x8], 0x0, 0x1ff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:31:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 222.089616][T19916] usb usb7: usbfs: process 19916 (syz-executor.1) did not claim interface 0 before use 23:31:01 executing program 2: epoll_create1(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 23:31:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 222.145637][T19924] usb usb7: usbfs: process 19924 (syz-executor.1) did not claim interface 0 before use 23:31:01 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xa00, 0x1, [{0x1, 0x1}]}) 23:31:01 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0) getpid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000001c0)=0xfffffffffffffee2) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, r1, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000640)={@remote, 0x3f, r1}) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000005c0)=@x25, &(0x7f0000000140)=0x80) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000200)={{0x1, 0x1ff, 0x3f, 0x3}, 'syz1\x00', 0x3}) getxattr(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="3884f47c6eb0266046b02e1d17a209d25bd60ed3b1e8be8197b2804b078544d85c41f25652f8de99f706614aa4cf2694616190e8690803ff8d9b445f83ff856663642dc1e7242de3c4af7752d6f4f2d2ca6edda7fff81aa6755ddb813ea447626ca24dd03efe85be80b3f7b9b8efb08a8372d180bb6e58e788489857d3d319ac9d0fad802c54823678619db9a6f337c5763155e7d658277e4ffff5e1affe53a5f6bbcfe8312de7"], 0x0, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000001080)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedb0400060000000000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea9172e23931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93cbf84892e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46cf9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02776f0b1a212dc1b7aaf9da3a56bafd161987200957297ea07a34ddb84a0091572e7ec196243047cb8d55402700b82b8f9acd3927e6cb61e263454da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdb6d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b"], 0x1cb) prctl$PR_SET_PTRACER(0x59616d61, r5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) 23:31:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) creat(0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000700)='/dev/rtc#\x00', 0x2, 0x206301) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r3 = openat(0xffffffffffffffff, &(0x7f0000000f40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x30) sendto$inet6(r3, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r4 = creat(&(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r4, 0x100000003, 0xfb7d, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socket(0x10, 0x80002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r6) socketpair(0x1, 0x100000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000b80)='lo:&\xb7`Q\xb1Y\xb9\xc8J,`\xd2\x98\x00\x00\x00 \xb1\x93\x92\xb1\x92\xb28\xda\xaa\xa5\x99\xd7\x1cq;\xed[0\x8d\x0f\x8a\x88:\xe9\xb0\x0e\x99\xef\xb3\x15N\xd7\x12*t\xef\xc7\xc2\x91\x18\xd6\xb5@\xe4\x9cLYy6\xd6\x8f\x03\xddu\x02\xb9V\xbetNg\xf7e\xf1F\xd8)\x8bF\x1b\x8eXm\xd6E\xf8\x01\x89\xc3 \x05b6\xc3\x9b\x93\x8c\xd3\xa8N\xa1\xaaZ\f\xf9RA*\xcc\xe8\xedQd\xdfr\xb4\x92G\xa6\xd0\x86\xd2\a\xb5l\xad\xa8\xa0\x00V\xc6\x13V\xf9\x9b\xbb0Ts\x18[%\x1a\xb5\xcfn\x9e\x86\x86;E') syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000009c0)=ANY=[@ANYRES64]], 0x100bd) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r9, 0x407, 0x200006) splice(r8, 0x0, r9, 0x0, 0x55aa40be, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r10, 0x407, 0x200006) fcntl$setpipe(r10, 0x407, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 222.401799][T20045] usb usb7: usbfs: process 20045 (syz-executor.1) did not claim interface 0 before use [ 222.447232][T20052] usb usb7: usbfs: process 20052 (syz-executor.1) did not claim interface 0 before use 23:31:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{0x77359400}}], 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20004000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x2c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x12}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) 23:31:01 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000080)="2138d32bac477ca8aa827b60c6213158dc19f0df55e53770404251f0342e0fb3331ef8da1f8d3b7e627eb90c2c0dfb80bdc4d0f75ec06d70b30bd0d6ce8cb78929121894cd5ec4c12f042a5f735e02f0664d366577b1257c92129aa29ff6f6525a7ba65f3bc77d5a5e0b96f12e8f18d2a8e69bca2742f3f951c20c8dbe299fd7af9d93ca71e1c6f38cd32831e9362aefd2c15e94f03d08d8f3c15d199af2217a05f40c41f27a326ce78d572116db9f64d7f4d566c1a946815d092038c739b3ec74406be186f2024ef8d56a9c5d59f1d8a9a17c27494dfe8fd13d88c4f03b", 0xde) 23:31:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:01 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0) getpid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000001c0)=0xfffffffffffffee2) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, r1, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000640)={@remote, 0x3f, r1}) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000005c0)=@x25, &(0x7f0000000140)=0x80) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000200)={{0x1, 0x1ff, 0x3f, 0x3}, 'syz1\x00', 0x3}) getxattr(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="3884f47c6eb0266046b02e1d17a209d25bd60ed3b1e8be8197b2804b078544d85c41f25652f8de99f706614aa4cf2694616190e8690803ff8d9b445f83ff856663642dc1e7242de3c4af7752d6f4f2d2ca6edda7fff81aa6755ddb813ea447626ca24dd03efe85be80b3f7b9b8efb08a8372d180bb6e58e788489857d3d319ac9d0fad802c54823678619db9a6f337c5763155e7d658277e4ffff5e1affe53a5f6bbcfe8312de7"], 0x0, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1cb) prctl$PR_SET_PTRACER(0x59616d61, r5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) 23:31:01 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xb00, 0x1, [{0x1, 0x1}]}) 23:31:01 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) sendmmsg$alg(r0, &(0x7f0000001b80)=[{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000340)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x18}], 0x48, 0x4000044}, {0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000003c0)="110dc25de41758424cfabf46653600618801526bd8c0659e90d5db0eca0ca3e6adeecca9da3be9d5019dd3280668d82d2d2aee5869b1083055efe79153bb69cc8339", 0x42}, {&(0x7f0000000440)="9973e72bc56f25145b00f18c95f79ccac0c70445bea5f193515a8ef4b9708e08ea59f96d1f721a11f884878dacc1c52192b027b4ec354570c5915d1daa66400539430669009c29f427a0e69807abe85799a06854cb1b233b7b585072082f67a1a635dbb731fe46a0046a9124a9de38dfb3bd0fcdbf2426edb2a381287d991e56e79dc422d94bb95f34566c49722fcd83315ccd", 0x93}, {&(0x7f0000000500)="18cf56668a415c7baa423b3083afdb2b8ee693f75613d82906fe55ceba05efb6a7756b43d0c559c72ac254dae2", 0x2d}, {&(0x7f0000000540)="5887823e423d38f7942a3ab7b8934a960c9d87a4db3079fb9281d9b6b7b5525913f69bc417d54e222e428ddc611d71ea77d89b16732c79bf5e062c64bd8c81ad183008b0f48d021e80c737a23ca20f5a41989af2fbe5978fbe91f908c9ff4b08c971fb4cf36fed3035de1b0d60e8845d620e3f9bc65d9a863ba4c37508b193486241d2c0de1dbe861971335483e3037680843e3fe719e37ae7b11d6aad82c72d3cb0fa4b5ecea5573f0b05", 0xab}], 0x4, 0x0, 0x0, 0x20008014}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000e40)}, {&(0x7f0000000f40)="28e7b45f0ac0acae7064c623c2eecfc359ddc3761be5d8f4e538d4017bd473b8f53cd3a64b94355a7d343e32241f968717265411a7aacf1be74e518fe452d31b9f5a6021aa23110afc88ac23076ca5c9d891abd9b3d93ff399e4571436a785af39b4ae4ad51ffe0f1015ed061458306e041b", 0x72}], 0x2, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x172, 0x4000045}, {0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000001200)}, {&(0x7f0000001240)="458d4e163016eca7edcab7350c0e921c36806b18514e827c0d0880a714cf221a1793c967c8ca1cb8a118ab6d621c81a3f55b83641d9b2c12d9405c8947d3b37f8a3cdebed77aee98e3bfe950343114051d4a01107cc5fb5aaf2007180049e7bab42b6c1cc2e028c66203a932b4de0a2eae32d0bf55aba3d6cbb697ec07ff717f9a3a8afbe9b9a212117f2c7cac1a0df05bbc230a2183b68fbcabacd8793de9c5e0c0b787ebadff6d7418f6488fb2176b8121e7a65dbac0e4f628e62573cc7b1653fbb83773617d93deac710033325f2261d8439a0981e515d24ef78744f2613b2d7f3c0fee92ea53a46f7e", 0xeb}, {0x0}], 0x3, 0x0, 0x0, 0x4000081}, {0x0, 0x0, &(0x7f0000001800)=[{0x0}, {&(0x7f0000001500)="e2227115cc8770152ce990a8821a302e94eec48e96f7e9a806ddd53c32f6e5a3bb657d6117634d2dee88208680299fc7977479c4c0cbda357923c538f24d8a4f8ec5ed627f52557169176c58291aef45ca55804c44778b693de30161de365b6ddec879831edbf47555fb14b5c30640c88fd8773f9249d74c", 0x78}], 0x2, 0x0, 0x0, 0x24000050}, {0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001880)}, {&(0x7f0000001900)="10707e0c7e49e3cd933fe3a0bcd8f0bb0583e78a2eceacacaaa3f2ca0d1b7c00033547503fa90eac693459b8c6901a52751ab6d7987e8593de9a109094f0ebd8c233c9f7903f0f1a6c469eca19262f3af3bfcbe2e88f2761b0001cf0c2c26caeebd20fa3bdbe46b191b1de43ab85d9206454e9e83ca62fe36836823730928228aa4222cb87b688d2f13f95cc0554075437f6", 0x92}, {&(0x7f00000019c0)="781567c89cb9c762f68ffd0f711b6958fe8d4377794950d79376c2050ede88eb31610c56105e003d015a7f12acdac17d93", 0x31}], 0x3, &(0x7f0000001a40)=[@assoc={0x18, 0x117, 0x4, 0xaa}, @assoc={0x18, 0x117, 0x4, 0x10001}], 0x30, 0x44040}], 0x7, 0x20040085) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getresuid(&(0x7f0000004180)=0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000200)) setreuid(0x0, 0x0) r6 = socket$packet(0x11, 0x0, 0x300) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000040)={r8, 0x1, 0x6, @local}, 0x10) socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r11) getgroups(0x6, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, r11, 0x0, 0xffffffffffffffff, 0x0]) r12 = getgid() lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getgroups(0x5, &(0x7f0000000340)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0]) lstat(&(0x7f0000000980)='./bus\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r14) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r15) getgroups(0x3, &(0x7f0000000a80)=[r14, r15, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', r17, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {0x1, 0xa}, [{0x2, 0x4}, {}, {0x2, 0x3, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x4}, {0x2, 0x6, r9}, {0x2, 0x1, r10}, {0x2, 0x1, r2}], {0x4, 0x1}, [{0x8, 0x4, r11}, {0x8, 0x1, r12}, {0x8, 0x10127d4612d9bd9b, 0xee00}, {0x8, 0x6}, {0x8, 0x1, r13}, {0x8, 0x2, r16}, {0x8, 0x4}, {}], {0x10, 0x1}, {0x20, 0x5}}, 0xa4, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000300)={r18, &(0x7f00000002c0)=""/27}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000000)={r18, 0x24}) keyctl$update(0x2, 0x0, &(0x7f0000000200)="a98815f96387bed579c54f62be37169cc416cba796e6a36c5048117c03946bb64f66be9d99b53b3b576142dac51510d31c2c1efcde92d7d6d34fa3c317ff713d6ed132be1aeeef6ffafbef6dffaadb50ee3a5554c12d85fa3ece4e93140dd452fd7404b0", 0x64) keyctl$setperm(0x5, 0x0, 0x60b0800) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x6) 23:31:01 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) [ 222.674301][T20072] usb usb7: usbfs: process 20072 (syz-executor.1) did not claim interface 0 before use 23:31:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 222.767721][T20157] usb usb7: usbfs: process 20157 (syz-executor.1) did not claim interface 0 before use 23:31:01 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) r1 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:31:01 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xc00, 0x1, [{0x1, 0x1}]}) 23:31:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r4, 0x4008ae48, &(0x7f00000002c0)) 23:31:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 223.022959][T20214] usb usb7: usbfs: process 20214 (syz-executor.1) did not claim interface 0 before use [ 223.066098][T20269] usb usb7: usbfs: process 20269 (syz-executor.1) did not claim interface 0 before use [ 223.188445][T20177] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 223.232118][T20177] File: /root/syzkaller-testdir127715353/syzkaller.3pTfkP/167/bus PID: 20177 Comm: syz-executor.5 23:31:02 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000300)='.\x00', 0xfe) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x1) sendfile(r5, r5, &(0x7f0000000200), 0xa198) 23:31:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:02 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xd00, 0x1, [{0x1, 0x1}]}) 23:31:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x61, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="03"], 0x1) creat(&(0x7f0000000000)='./bus\x00', 0x0) 23:31:02 executing program 3: clone(0x30200a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0x400, 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:31:02 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) sendmmsg$alg(r0, &(0x7f0000001b80)=[{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000340)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x18}], 0x48, 0x4000044}, {0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000003c0)="110dc25de41758424cfabf46653600618801526bd8c0659e90d5db0eca0ca3e6adeecca9da3be9d5019dd3280668d82d2d2aee5869b1083055efe79153bb69cc8339", 0x42}, {&(0x7f0000000440)="9973e72bc56f25145b00f18c95f79ccac0c70445bea5f193515a8ef4b9708e08ea59f96d1f721a11f884878dacc1c52192b027b4ec354570c5915d1daa66400539430669009c29f427a0e69807abe85799a06854cb1b233b7b585072082f67a1a635dbb731fe46a0046a9124a9de38dfb3bd0fcdbf2426edb2a381287d991e56e79dc422d94bb95f34566c49722fcd83315ccd", 0x93}, {&(0x7f0000000500)="18cf56668a415c7baa423b3083afdb2b8ee693f75613d82906fe55ceba05efb6a7756b43d0c559c72ac254dae2", 0x2d}, {&(0x7f0000000540)="5887823e423d38f7942a3ab7b8934a960c9d87a4db3079fb9281d9b6b7b5525913f69bc417d54e222e428ddc611d71ea77d89b16732c79bf5e062c64bd8c81ad183008b0f48d021e80c737a23ca20f5a41989af2fbe5978fbe91f908c9ff4b08c971fb4cf36fed3035de1b0d60e8845d620e3f9bc65d9a863ba4c37508b193486241d2c0de1dbe861971335483e3037680843e3fe719e37ae7b11d6aad82c72d3cb0fa4b5ecea5573f0b05", 0xab}], 0x4, 0x0, 0x0, 0x20008014}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000e40)}, {&(0x7f0000000f40)="28e7b45f0ac0acae7064c623c2eecfc359ddc3761be5d8f4e538d4017bd473b8f53cd3a64b94355a7d343e32241f968717265411a7aacf1be74e518fe452d31b9f5a6021aa23110afc88ac23076ca5c9d891abd9b3d93ff399e4571436a785af39b4ae4ad51ffe0f1015ed061458306e041b", 0x72}], 0x2, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x172, 0x4000045}, {0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000001200)}, {&(0x7f0000001240)="458d4e163016eca7edcab7350c0e921c36806b18514e827c0d0880a714cf221a1793c967c8ca1cb8a118ab6d621c81a3f55b83641d9b2c12d9405c8947d3b37f8a3cdebed77aee98e3bfe950343114051d4a01107cc5fb5aaf2007180049e7bab42b6c1cc2e028c66203a932b4de0a2eae32d0bf55aba3d6cbb697ec07ff717f9a3a8afbe9b9a212117f2c7cac1a0df05bbc230a2183b68fbcabacd8793de9c5e0c0b787ebadff6d7418f6488fb2176b8121e7a65dbac0e4f628e62573cc7b1653fbb83773617d93deac710033325f2261d8439a0981e515d24ef78744f2613b2d7f3c0fee92ea53a46f7e", 0xeb}, {0x0}], 0x3, 0x0, 0x0, 0x4000081}, {0x0, 0x0, &(0x7f0000001800)=[{0x0}, {&(0x7f0000001500)="e2227115cc8770152ce990a8821a302e94eec48e96f7e9a806ddd53c32f6e5a3bb657d6117634d2dee88208680299fc7977479c4c0cbda357923c538f24d8a4f8ec5ed627f52557169176c58291aef45ca55804c44778b693de30161de365b6ddec879831edbf47555fb14b5c30640c88fd8773f9249d74c", 0x78}], 0x2, 0x0, 0x0, 0x24000050}, {0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001880)}, {&(0x7f0000001900)="10707e0c7e49e3cd933fe3a0bcd8f0bb0583e78a2eceacacaaa3f2ca0d1b7c00033547503fa90eac693459b8c6901a52751ab6d7987e8593de9a109094f0ebd8c233c9f7903f0f1a6c469eca19262f3af3bfcbe2e88f2761b0001cf0c2c26caeebd20fa3bdbe46b191b1de43ab85d9206454e9e83ca62fe36836823730928228aa4222cb87b688d2f13f95cc0554075437f6", 0x92}, {&(0x7f00000019c0)="781567c89cb9c762f68ffd0f711b6958fe8d4377794950d79376c2050ede88eb31610c56105e003d015a7f12acdac17d93", 0x31}], 0x3, &(0x7f0000001a40)=[@assoc={0x18, 0x117, 0x4, 0xaa}, @assoc={0x18, 0x117, 0x4, 0x10001}], 0x30, 0x44040}], 0x7, 0x20040085) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getresuid(&(0x7f0000004180)=0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000200)) setreuid(0x0, 0x0) r6 = socket$packet(0x11, 0x0, 0x300) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000040)={r8, 0x1, 0x6, @local}, 0x10) socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r11) getgroups(0x6, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, r11, 0x0, 0xffffffffffffffff, 0x0]) r12 = getgid() lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getgroups(0x5, &(0x7f0000000340)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0]) lstat(&(0x7f0000000980)='./bus\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r14) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r15) getgroups(0x3, &(0x7f0000000a80)=[r14, r15, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', r17, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {0x1, 0xa}, [{0x2, 0x4}, {}, {0x2, 0x3, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x4}, {0x2, 0x6, r9}, {0x2, 0x1, r10}, {0x2, 0x1, r2}], {0x4, 0x1}, [{0x8, 0x4, r11}, {0x8, 0x1, r12}, {0x8, 0x10127d4612d9bd9b, 0xee00}, {0x8, 0x6}, {0x8, 0x1, r13}, {0x8, 0x2, r16}, {0x8, 0x4}, {}], {0x10, 0x1}, {0x20, 0x5}}, 0xa4, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000300)={r18, &(0x7f00000002c0)=""/27}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000000)={r18, 0x24}) keyctl$update(0x2, 0x0, &(0x7f0000000200)="a98815f96387bed579c54f62be37169cc416cba796e6a36c5048117c03946bb64f66be9d99b53b3b576142dac51510d31c2c1efcde92d7d6d34fa3c317ff713d6ed132be1aeeef6ffafbef6dffaadb50ee3a5554c12d85fa3ece4e93140dd452fd7404b0", 0x64) keyctl$setperm(0x5, 0x0, 0x60b0800) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x6) 23:31:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:02 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0xe00, 0x1, [{0x1, 0x1}]}) [ 223.603665][T20332] usb usb7: usbfs: process 20332 (syz-executor.1) did not claim interface 0 before use [ 223.626245][T20339] usb usb7: usbfs: process 20339 (syz-executor.1) did not claim interface 0 before use 23:31:02 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x210000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x442200, 0x33) ioctl$VT_RELDISP(r4, 0x5605) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000180)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r5, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x400806e, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00'}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r6 = socket$inet6(0xa, 0x401000000001, 0x0) close(r6) r7 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) sendmsg$NFQNL_MSG_VERDICT(r7, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x400, 0x1, 0x3, 0x0, 0x0, 0x0, {0x3}, [@NFQA_VLAN={0xc, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xfff}]}, @NFQA_PAYLOAD={0xd0, 0xa, "47c0fd42caf958d30d8716c0ed485f585fbd122637cba49cba2239db7ce9ef494ec48a82df27757660824af2810a0570abf427e46b70d43c87a02be8aa2888b234d63d88b97fdf557d01433acd6a701cd6f85b5e2c8883c585c4a314e0c20c9609167e7896d213b722bfceec439a89c76097ee72dd08f0824d576f15c37a5f538417f072a5639be5954c39f8e7b239e41ce658e75a1b9f24be79c2a1287d4c2c84c893e569ab7237da1d8fcf38bab91084de2661a4eec5aea575b62d76776e51f15f5621a7b64dbd068c2dd9"}, @NFQA_EXP={0x178, 0xf, 0x0, 0x1, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_NAT={0x144, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x4c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @remote}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_NAT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @local}}}]}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x20, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_NAT_TUPLE={0x20, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}, @CTA_EXPECT_HELP_NAME={0xb, 0x6, 'amanda\x00'}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xfffffffd}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xf3}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x34, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x60a}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x20}]}, @NFQA_CT={0xfc, 0xb, 0x0, 0x1, [@CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}, @CTA_TUPLE_REPLY={0x8c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @broadcast}}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0xa}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1a}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x3}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8001}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x2}, @CTA_TUPLE_MASTER={0x38, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0xa}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}]}, @NFQA_VLAN={0x44, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x5}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1}]}]}, 0x400}, 0x1, 0x0, 0x0, 0x4004840}, 0x4000000) 23:31:02 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000040)={0x2001}) 23:31:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deab", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:02 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02006900000000008c2c2a04649055d43c0d499cd08b0591028af1ac331b52d81a5995c893491c36305dd45255021af6e365cd8ba575e6f6415eac2e9d90478ecf3dc8338ae6e692bae9266c2a68dbe845640b72c71a5d3b473e75e5613f50cc694e489917f16f88ca53ea99e94641261d1aa66ac6cdf5f93b53000000000000000000"], 0x2000, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) [ 223.784805][T20450] usb usb7: usbfs: process 20450 (syz-executor.1) did not claim interface 0 before use [ 223.882014][T20459] usb usb7: usbfs: process 20459 (syz-executor.1) did not claim interface 0 before use 23:31:02 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x1100, 0x1, [{0x1, 0x1}]}) 23:31:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deab", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:03 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) 23:31:03 executing program 5: [ 224.036434][T20560] usb usb7: usbfs: process 20560 (syz-executor.1) did not claim interface 0 before use 23:31:03 executing program 2: 23:31:03 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x1) r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0xfffffffffffffcbd) 23:31:03 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x1200, 0x1, [{0x1, 0x1}]}) 23:31:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deab", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:03 executing program 5: 23:31:03 executing program 2: [ 224.315741][T20605] usb usb7: usbfs: process 20605 (syz-executor.1) did not claim interface 0 before use 23:31:03 executing program 4: 23:31:03 executing program 5: 23:31:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 224.385037][T20675] usb usb7: usbfs: process 20675 (syz-executor.1) did not claim interface 0 before use 23:31:03 executing program 2: 23:31:03 executing program 4: 23:31:03 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x1d00, 0x1, [{0x1, 0x1}]}) 23:31:03 executing program 5: [ 224.659293][T20717] usb usb7: usbfs: process 20717 (syz-executor.1) did not claim interface 0 before use 23:31:03 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f00000000c0)="85a6a227b3d8d0195cdcb1c4dc05f20094cce2fb140228a8bad03cce0ac04773739997c0200de307d9d9ce0de03c804fd3e50aad483fb4c08e84ce3d62a0b843005703e1dbf29c0ab3607642ac4c22a8e25279862001ec86640ecd51710e9cd4f872b5bab51c28e5d70964ff6195c6799b87905be396e8a5f94d4bdb05c7", 0x7e, r0}, 0x68) r1 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:31:03 executing program 2: 23:31:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:03 executing program 4: 23:31:03 executing program 5: 23:31:03 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x2000, 0x1, [{0x1, 0x1}]}) 23:31:03 executing program 4: 23:31:03 executing program 2: 23:31:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:03 executing program 5: 23:31:03 executing program 2: 23:31:03 executing program 4: [ 224.988698][T20763] usb usb7: usbfs: process 20763 (syz-executor.1) did not claim interface 0 before use 23:31:04 executing program 5: 23:31:04 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) getxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/27, 0x1b) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xd8, r3, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x67}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1d}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}]}, 0xd8}}, 0x4040040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x1, 0x200, 0x8202, 0x10001, 0x9, 0x3, 0xa2, 0x0, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r4, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}}, 0x84) [ 225.061158][T20848] usb usb7: usbfs: process 20848 (syz-executor.1) did not claim interface 0 before use 23:31:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e6", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:04 executing program 2: 23:31:04 executing program 4: 23:31:04 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x2500, 0x1, [{0x1, 0x1}]}) 23:31:04 executing program 5: 23:31:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e6", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:04 executing program 2: 23:31:04 executing program 5: 23:31:04 executing program 4: [ 225.377645][T20949] usb usb7: usbfs: process 20949 (syz-executor.1) did not claim interface 0 before use 23:31:04 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x7fffffff, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x7, @empty, 0x3f}}}, 0x118) 23:31:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e6", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 225.455617][T20976] usb usb7: usbfs: process 20976 (syz-executor.1) did not claim interface 0 before use 23:31:04 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 23:31:04 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x3f00, 0x1, [{0x1, 0x1}]}) 23:31:04 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0xfffffffc}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 23:31:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newtfilter={0x24, 0x22, 0xd27}, 0x24}}, 0x0) 23:31:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) [ 225.676949][T20994] usb usb7: usbfs: process 20994 (syz-executor.1) did not claim interface 0 before use [ 225.695604][T21041] input input7: cannot allocate more than FF_MAX_EFFECTS effects 23:31:04 executing program 2: pipe(&(0x7f0000000340)) clone(0x20001000, 0x0, &(0x7f0000000100), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x242201, 0x0) unshare(0x40600) pselect6(0x40, &(0x7f00000000c0)={0x9}, 0x0, &(0x7f0000000140)={0x1b4}, 0x0, 0x0) [ 225.749421][T21089] input input9: cannot allocate more than FF_MAX_EFFECTS effects [ 225.768665][T21104] usb usb7: usbfs: process 21104 (syz-executor.1) did not claim interface 0 before use 23:31:04 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x2, 0xb9) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x2, 0x4, 0x0, 0x401}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r7, 0xc0884113, &(0x7f0000000200)={0x1, 0x7, 0x2, 0x400, 0x4, 0xe4b, 0xffff, 0x7, 0x3, 0x0, 0xffffff81, 0x1}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r8, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r8, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x8, 0xa, 0x4, 0x400000, 0x81f, {r4, r5/1000+10000}, {0x0, 0x0, 0x6, 0xe8, 0x0, 0xff, "f2def59c"}, 0x0, 0x3, @offset=0x1, 0x18f, 0x0, r8}) ioctl$sock_bt_hidp_HIDPCONNDEL(r9, 0x400448c9, &(0x7f00000001c0)={@none, 0x1}) 23:31:04 executing program 4: getpid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000003c0)={0x1e, 0x37, 0x2, {0x0, 0x6, 0x0, 0xffffffffffffffff}}, 0x1e) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x6b, 0x2, 0x0, 0x0, 0x3, 0x6}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) 23:31:04 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:04 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x4000, 0x1, [{0x1, 0x1}]}) [ 226.021449][T21186] usb usb7: usbfs: process 21186 (syz-executor.1) did not claim interface 0 before use 23:31:05 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x68, 0x1, 0x0, 0x0, {0xa, 0x2}}, 0x18}}, 0x0) 23:31:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) 23:31:05 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000080)={0x6, 'veth1_to_team\x00', {0x3f80}, 0x4}) [ 226.062879][T21233] usb usb7: usbfs: process 21233 (syz-executor.1) did not claim interface 0 before use 23:31:05 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x4800, 0x1, [{0x1, 0x1}]}) 23:31:05 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:05 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00004d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:31:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) [ 226.286377][T21279] usb usb7: usbfs: process 21279 (syz-executor.1) did not claim interface 0 before use [ 226.371001][T21360] usb usb7: usbfs: process 21360 (syz-executor.1) did not claim interface 0 before use 23:31:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:05 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:05 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x4000c05) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast1, 0x4e23, 0x0, 'lblcr\x00', 0x6da70134073e99b3, 0x18, 0x72}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000140)={0xa00000, 0xff, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9a091d, 0x5, [], @p_u32=&(0x7f00000000c0)=0x1}}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000200)={0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0]}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r6, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r4, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000180)=[0x81, 0x6, 0x5, 0xfffffffa, 0x1000, 0x2], 0x6, 0x0, r5, r6}) 23:31:05 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) setreuid(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x2d6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 23:31:05 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x4c00, 0x1, [{0x1, 0x1}]}) 23:31:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 23:31:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) [ 226.817360][T21376] usb usb7: usbfs: process 21376 (syz-executor.1) did not claim interface 0 before use 23:31:05 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:05 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) setreuid(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x2d6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 226.899268][T21420] usb usb7: usbfs: process 21420 (syz-executor.1) did not claim interface 0 before use 23:31:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:05 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x400000, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:31:05 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:06 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x5c00, 0x1, [{0x1, 0x1}]}) 23:31:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 23:31:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:06 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) setreuid(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x2d6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 227.185622][T21510] usb usb7: usbfs: process 21510 (syz-executor.1) did not claim interface 0 before use 23:31:06 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) [ 227.249121][T21568] usb usb7: usbfs: process 21568 (syz-executor.1) did not claim interface 0 before use 23:31:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 23:31:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:06 executing program 3: ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f00000002c0)='hostfs\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)=':vboxnet0\x00', &(0x7f0000000340)='\x00', 0x0) r1 = socket$inet(0x2, 0x3, 0x1) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r5 = dup(0xffffffffffffffff) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000400)=""/4) accept$packet(r2, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000017c0)=0x14) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f00000018c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001880)={&(0x7f0000001800)={0x7c, r4, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x8001, 0x6}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_STA_WME={0x3c, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x3c}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x2}, @NL80211_STA_WME_UAPSD_QUEUES={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x20}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x81}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x7f}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x5}]}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0xa2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x400}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) sendmsg$NL80211_CMD_GET_KEY(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00012bbd7000ffdbdf250900000004002800040028000800090005ac0f0004002800080037000000000024005080100008800400010004000200040002000800030001ac0f0005000200000000000c006e8004000200040001000e000a004cdb6b20013a50ccd531000009000700dd7d99923e0000000a000600aaaaaaaaaabb0000"], 0x88}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000000) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBMODE(r7, 0x4b45, &(0x7f00000000c0)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:31:06 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x6000, 0x1, [{0x1, 0x1}]}) 23:31:06 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:06 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) setreuid(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x2d6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 23:31:06 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 227.491545][T21637] usb usb7: usbfs: process 21637 (syz-executor.1) did not claim interface 0 before use [ 227.564779][T21645] usb usb7: usbfs: process 21645 (syz-executor.1) did not claim interface 0 before use 23:31:06 executing program 5: request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:06 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) setreuid(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x2d6) 23:31:06 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x0, 0x1, 0x200}) 23:31:06 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:06 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x6800, 0x1, [{0x1, 0x1}]}) 23:31:06 executing program 5: request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:06 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f00000198c0)=""/102394) r4 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r7, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r7, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000200)={0x0, 0x7, 0x4, 0x0, 0x3, {0x0, 0x7530}, {0x3, 0x8, 0x7f, 0x4, 0x3, 0x6, "ee34a47a"}, 0x5, 0x1, @userptr=0x5, 0x2, 0x0, r7}) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$netrom_NETROM_T1(r10, 0x103, 0x1, &(0x7f0000000280), &(0x7f0000000300)=0x4) connect$vsock_stream(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r11 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r11, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r11, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r12 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r12, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x5) connect$vsock_stream(r12, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) r13 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r13, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) r14 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r14, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x31) connect$vsock_stream(r14, &(0x7f00000002c0)={0x28, 0x0, 0x0, @local}, 0x10) accept(r14, 0x0, &(0x7f0000000400)=0xe) r15 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x420000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r15, 0x4020ae46, &(0x7f0000000100)={0x1fd, 0x0, 0x2000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r16 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2000, 0x0) setsockopt$inet6_dccp_int(r16, 0x21, 0x3, &(0x7f00000001c0)=0x2ac7, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r8, 0x660c) r17 = socket$inet(0x2, 0x3, 0x1) r18 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r18, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r18, 0x5411, &(0x7f0000000880)) getsockopt$IPT_SO_GET_REVISION_TARGET(r17, 0x0, 0x43, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 23:31:06 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:06 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) setreuid(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 227.904838][T21770] usb usb7: usbfs: process 21770 (syz-executor.1) did not claim interface 0 before use 23:31:06 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0xc0f85403, &(0x7f0000000000)={0x1, 0x21}) 23:31:06 executing program 5: request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) [ 227.965785][T21779] usb usb7: usbfs: process 21779 (syz-executor.1) did not claim interface 0 before use 23:31:07 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x6c00, 0x1, [{0x1, 0x1}]}) 23:31:07 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:07 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:31:07 executing program 5: mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) request_key(0x0, 0x0, &(0x7f0000000080)='usermime_type\x00', 0xfffffffffffffffe) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 23:31:07 executing program 0: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1902d7", 0x44, 0x2f, 0x0, @empty, @ipv4={[], [], @remote}, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4305, 0xf}}}}}}}, 0x0) [ 228.169767][T21896] usb usb7: usbfs: process 21896 (syz-executor.1) did not claim interface 0 before use 23:31:07 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x68, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) 23:31:07 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000800000018100000", @ANYRES32, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 228.226615][T21901] usb usb7: usbfs: process 21901 (syz-executor.1) did not claim interface 0 before use [ 272.683915][ T0] NOHZ: local_softirq_pending 08 [ 273.964555][ T0] NOHZ: local_softirq_pending 08 [ 291.883002][ T0] NOHZ: local_softirq_pending 08 [ 295.083129][ T0] NOHZ: local_softirq_pending 08 [ 313.003763][ T0] NOHZ: local_softirq_pending 08 [ 333.483061][ T0] NOHZ: local_softirq_pending 08 [ 380.202553][ T1139] INFO: task syz-executor.3:21769 blocked for more than 143 seconds. [ 380.210706][ T1139] Not tainted 5.6.0-rc2-syzkaller #0 [ 380.216821][ T1139] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 380.225569][ T1139] syz-executor.3 D28632 21769 8893 0x00004004 [ 380.231882][ T1139] Call Trace: [ 380.235353][ T1139] __schedule+0x87f/0xcd0 [ 380.239748][ T1139] schedule+0x188/0x210 [ 380.244069][ T1139] __lock_sock+0x15f/0x2a0 [ 380.248673][ T1139] ? init_wait_entry+0xe0/0xe0 [ 380.253516][ T1139] lock_sock_nested+0x7c/0x120 [ 380.258321][ T1139] virtio_transport_release+0x5e/0xd20 [ 380.264799][ T1139] vsock_assign_transport+0x1e5/0x3b0 [ 380.270198][ T1139] vsock_stream_connect+0x46d/0xb50 [ 380.275564][ T1139] ? init_wait_entry+0xe0/0xe0 [ 380.280490][ T1139] ? security_socket_connect+0xb0/0xd0 [ 380.286120][ T1139] __sys_connect+0x314/0x3a0 [ 380.290779][ T1139] ? prepare_exit_to_usermode+0x221/0x5b0 [ 380.296616][ T1139] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 380.302402][ T1139] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 380.307856][ T1139] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 380.313697][ T1139] __x64_sys_connect+0x7a/0x90 [ 380.318599][ T1139] do_syscall_64+0xf7/0x1c0 [ 380.323166][ T1139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.329184][ T1139] RIP: 0033:0x45c6c9 [ 380.333339][ T1139] Code: 08 48 c7 44 24 10 00 00 00 00 48 89 74 24 18 48 89 7c 24 20 48 89 54 24 28 48 89 4c 24 30 0f 57 c0 0f 11 44 24 38 48 c7 44 24 <48> 00 00 00 00 e8 ad 53 ff ff 48 8b 44 24 50 48 8b 4c 24 58 48 89 [ 380.353532][ T1139] RSP: 002b:00007fc35a44bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 380.362067][ T1139] RAX: ffffffffffffffda RBX: 00007fc35a44c6d4 RCX: 000000000045c6c9 [ 380.370470][ T1139] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 000000000000000b [ 380.379360][ T1139] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 380.387431][ T1139] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 380.395696][ T1139] R13: 0000000000000096 R14: 00000000004c3161 R15: 000000000076bf2c [ 380.403787][ T1139] [ 380.403787][ T1139] Showing all locks held in the system: [ 380.411785][ T1139] 1 lock held by khungtaskd/1139: [ 380.416880][ T1139] #0: ffffffff892d9908 (rcu_read_lock){....}, at: rcu_lock_acquire+0x4/0x30 [ 380.425802][ T1139] 1 lock held by rsyslogd/8754: [ 380.430793][ T1139] #0: ffff8880977a7120 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x279/0x310 [ 380.439713][ T1139] 2 locks held by getty/8844: [ 380.444611][ T1139] #0: ffff8880a6dab090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.454002][ T1139] #1: ffffc9000185b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.463604][ T1139] 2 locks held by getty/8845: [ 380.468328][ T1139] #0: ffff8880a3bf4090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.477608][ T1139] #1: ffffc9000184b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.487973][ T1139] 2 locks held by getty/8846: [ 380.492730][ T1139] #0: ffff88809552b090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.501978][ T1139] #1: ffffc900017db2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.511780][ T1139] 2 locks held by getty/8847: [ 380.516562][ T1139] #0: ffff8880930e1090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.527467][ T1139] #1: ffffc9000186b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.537309][ T1139] 2 locks held by getty/8848: [ 380.542094][ T1139] #0: ffff8880a23a6090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.551628][ T1139] #1: ffffc9000183b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.561248][ T1139] 2 locks held by getty/8849: [ 380.565965][ T1139] #0: ffff88809fa35090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.575276][ T1139] #1: ffffc9000187b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.585050][ T1139] 2 locks held by getty/8850: [ 380.589725][ T1139] #0: ffff8880a0f66090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 380.599702][ T1139] #1: ffffc900017bb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 380.609511][ T1139] 1 lock held by syz-executor.3/21769: [ 380.615073][ T1139] #0: ffff8880a7bbf190 (sk_lock-AF_VSOCK){+.+.}, at: vsock_stream_connect+0x110/0xb50 [ 380.624788][ T1139] [ 380.627100][ T1139] ============================================= [ 380.627100][ T1139] [ 380.635567][ T1139] NMI backtrace for cpu 1 [ 380.639887][ T1139] CPU: 1 PID: 1139 Comm: khungtaskd Not tainted 5.6.0-rc2-syzkaller #0 [ 380.648214][ T1139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.658252][ T1139] Call Trace: [ 380.661534][ T1139] dump_stack+0x1fb/0x318 [ 380.665895][ T1139] nmi_cpu_backtrace+0xaa/0x190 [ 380.670734][ T1139] ? nmi_trigger_cpumask_backtrace+0x168/0x290 [ 380.676930][ T1139] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 380.682982][ T1139] nmi_trigger_cpumask_backtrace+0x16f/0x290 [ 380.688940][ T1139] arch_trigger_cpumask_backtrace+0x10/0x20 [ 380.694918][ T1139] trigger_all_cpu_backtrace+0x17/0x20 [ 380.700395][ T1139] watchdog+0xd40/0xd60 [ 380.704616][ T1139] kthread+0x332/0x350 [ 380.708691][ T1139] ? hungtask_pm_notify+0x50/0x50 [ 380.713700][ T1139] ? kthread_blkcg+0xe0/0xe0 [ 380.718268][ T1139] ret_from_fork+0x24/0x30 [ 380.722919][ T1139] Sending NMI from CPU 1 to CPUs 0: [ 380.728171][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x12/0x20 [ 380.730005][ T1139] Kernel panic - not syncing: hung_task: blocked tasks [ 380.743338][ T1139] CPU: 1 PID: 1139 Comm: khungtaskd Not tainted 5.6.0-rc2-syzkaller #0 [ 380.751574][ T1139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.761614][ T1139] Call Trace: [ 380.764894][ T1139] dump_stack+0x1fb/0x318 [ 380.769331][ T1139] panic+0x264/0x7a9 [ 380.773214][ T1139] ? nmi_trigger_cpumask_backtrace+0x218/0x290 [ 380.779362][ T1139] watchdog+0xd53/0xd60 [ 380.783521][ T1139] kthread+0x332/0x350 [ 380.787570][ T1139] ? hungtask_pm_notify+0x50/0x50 [ 380.792594][ T1139] ? kthread_blkcg+0xe0/0xe0 [ 380.797204][ T1139] ret_from_fork+0x24/0x30 [ 380.803487][ T1139] Kernel Offset: disabled [ 380.807817][ T1139] Rebooting in 86400 seconds..