ffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:29 executing program 2: sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000200)) 00:28:29 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000380)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}}, &(0x7f0000000080)) 00:28:29 executing program 4: r0 = openat$zero(0xffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 00:28:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200420, &(0x7f0000000540)) 00:28:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="f0000000", @ANYRES16, @ANYBLOB="01"], 0xf0}, 0x1, 0x0, 0x0, 0x50}, 0x0) 00:28:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x7fffffe, 0x200, 0xd9d8, 0x0, 0xd0e0000, 0x1ac, 0xce, 0x1ac, 0x1d8, 0x1d8, 0x1ac, 0x1d8, 0x4, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'veth0_macvtap\x00'}, 0x0, 0x70, 0x94}, @common=@unspec=@STANDARD={0x24}}, {{@ip={@private, @local, 0x0, 0x0, 'batadv_slave_0\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x25c) [ 424.166373][ T37] audit: type=1804 audit(1617496109.327:21): pid=12642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/121/bus" dev="sda1" ino=14270 res=1 errno=0 00:28:29 executing program 3: timer_create(0x9, 0x0, &(0x7f0000000040)) 00:28:29 executing program 2: syz_open_procfs(0x0, &(0x7f0000001580)='status\x00') syz_open_procfs(0x0, &(0x7f0000001580)='status\x00') 00:28:29 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:29 executing program 5: r0 = socket(0x25, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780)='batadv\x00', r0) 00:28:29 executing program 1: r0 = fork() tkill(r0, 0x0) 00:28:29 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x1c) 00:28:29 executing program 3: timer_create(0x9, 0x0, &(0x7f0000000040)) [ 424.571911][ T20] Bluetooth: hci2: command 0x040f tx timeout 00:28:29 executing program 5: bpf$MAP_UPDATE_ELEM(0x1d, 0x0, 0x0) 00:28:29 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:29 executing program 3: timer_create(0x9, 0x0, &(0x7f0000000040)) 00:28:29 executing program 2: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400) [ 426.651959][ T20] Bluetooth: hci2: command 0x0419 tx timeout 00:28:34 executing program 4: openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000003980)='/dev/ttyS3\x00', 0x400, 0x0) 00:28:34 executing program 1: timer_create(0x0, &(0x7f00000013c0)={0x0, 0x0, 0x4, @tid=0xffffffffffffffff}, 0x0) 00:28:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400800}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0xc4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0xa0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @dev}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @private0, 0x10000}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x6, @empty}}}}]}]}, 0xc4}}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:28:34 executing program 3: timer_create(0x9, 0x0, &(0x7f0000000040)) 00:28:34 executing program 2: bpf$MAP_UPDATE_ELEM(0x1c, 0x0, 0x0) 00:28:34 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:34 executing program 3: timer_create(0x7, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x77359400}, {0x77359400}}, 0x0) 00:28:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, 0x0) 00:28:34 executing program 5: r0 = socket(0x25, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:28:34 executing program 1: openat$ttyS3(0xffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$ttyS3(0xffffff9c, &(0x7f0000003980)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000039c0)) [ 429.089052][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 429.089070][ T37] audit: type=1804 audit(1617496114.237:24): pid=12706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/124/bus" dev="sda1" ino=14286 res=1 errno=0 00:28:34 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='net/psched\x00') 00:28:34 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 00:28:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000040)={'syz_tun\x00', @ifru_flags}) 00:28:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=0x64010101}}}}) 00:28:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000004140)={'ip_vti0\x00', &(0x7f00000040c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @local}}}}) 00:28:34 executing program 4: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) 00:28:34 executing program 5: socketpair(0x2, 0x0, 0x7fff, &(0x7f00000045c0)) [ 429.503951][ T37] audit: type=1804 audit(1617496114.667:25): pid=12727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/125/bus" dev="sda1" ino=14285 res=1 errno=0 00:28:34 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:34 executing program 3: syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000001200)='SMC_PNETID\x00', r0) 00:28:34 executing program 1: process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 00:28:34 executing program 5: socket(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x440000) 00:28:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000f8"], 0x14}}, 0x0) 00:28:34 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x319000, 0x0) [ 429.836305][ T37] audit: type=1804 audit(1617496114.997:26): pid=12742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/126/bus" dev="sda1" ino=14276 res=1 errno=0 00:28:35 executing program 3: syz_genetlink_get_family_id$devlink(&(0x7f00000027c0)='devlink\x00', 0xffffffffffffffff) 00:28:35 executing program 1: r0 = gettid() sched_setattr(r0, &(0x7f0000000040)={0x38}, 0x0) 00:28:35 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:35 executing program 2: socket$inet(0x2, 0x0, 0x80000001) 00:28:35 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ieee802154, 0x80, 0x0}, 0x0) 00:28:35 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 00:28:35 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x1, 0x0) 00:28:35 executing program 2: sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000001040)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2a, 0x2, 0x0, &(0x7f0000000040)) [ 430.203885][ T37] audit: type=1804 audit(1617496115.357:27): pid=12766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/127/bus" dev="sda1" ino=14293 res=1 errno=0 00:28:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_OCB(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0xff86}}, 0x40100) 00:28:35 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x10000000) 00:28:35 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) connect$rds(r0, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) 00:28:35 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:35 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ieee802154, 0x80, 0x0}, 0x40c1) 00:28:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}}}}) 00:28:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="9e"], 0x28}}, 0x0) 00:28:35 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) connect$rds(r0, 0x0, 0x0) [ 430.579967][ T37] audit: type=1804 audit(1617496115.737:28): pid=12787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/128/bus" dev="sda1" ino=14296 res=1 errno=0 00:28:35 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x410002, 0x0) 00:28:35 executing program 3: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 00:28:35 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x3, 0x0) 00:28:35 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:35 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f0000001200)='SMC_PNETID\x00', 0xffffffffffffffff) 00:28:36 executing program 1: select(0x40, &(0x7f0000000300)={0x1}, &(0x7f0000000340)={0x5}, 0x0, &(0x7f00000003c0)={0x0, 0x2710}) 00:28:36 executing program 5: sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0xa, 0x0, 0x0, &(0x7f0000002740)) 00:28:36 executing program 4: sched_rr_get_interval(0x0, &(0x7f00000000c0)) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 00:28:36 executing program 3: socket(0x18, 0x0, 0x401) [ 430.941678][ T37] audit: type=1804 audit(1617496116.097:29): pid=12803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/129/bus" dev="sda1" ino=14263 res=1 errno=0 00:28:36 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 00:28:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:36 executing program 4: socketpair(0x22, 0x0, 0x0, &(0x7f0000000300)) 00:28:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:36 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 00:28:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000001280)='l2tp\x00', r0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001200)='l2tp\x00', 0xffffffffffffffff) 00:28:36 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) socketpair(0x2a, 0x0, 0x0, &(0x7f0000000280)) 00:28:36 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x123001, 0x0) write$capi20_data(r0, 0x0, 0x13) 00:28:36 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x1010c1, 0x0) 00:28:36 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x8]}, 0x8}) [ 431.338296][ T37] audit: type=1804 audit(1617496116.497:30): pid=12827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/130/bus" dev="sda1" ino=14278 res=1 errno=0 00:28:36 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x8]}, 0x8}) 00:28:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:36 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 00:28:36 executing program 1: rt_sigqueueinfo(0x0, 0x9, &(0x7f0000000040)={0x0, 0x0, 0x6}) 00:28:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x1}, 0x4) [ 431.596798][ T37] audit: type=1804 audit(1617496116.757:31): pid=12845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/131/bus" dev="sda1" ino=14279 res=1 errno=0 00:28:36 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) 00:28:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:36 executing program 4: sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0xf958728cd7b232cf) [ 431.916844][ T37] audit: type=1804 audit(1617496117.077:32): pid=12858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/132/bus" dev="sda1" ino=14309 res=1 errno=0 [ 431.942072][ C1] vkms_vblank_simulate: vblank timer overrun 00:28:37 executing program 2: r0 = gettid() process_vm_writev(r0, &(0x7f0000001c40)=[{&(0x7f0000000000)=""/178, 0xb2}], 0x1, &(0x7f00000023c0)=[{0x0}, {0x0, 0x11}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 00:28:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)=0xfd) 00:28:37 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x0, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, 0x0, 0x0) 00:28:37 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) ioctl$FIONCLEX(r0, 0x5450) 00:28:37 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)) 00:28:37 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) [ 432.482146][ T37] audit: type=1804 audit(1617496117.637:33): pid=12873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/133/bus" dev="sda1" ino=14312 res=1 errno=0 00:28:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') pread64(r0, 0x0, 0x0, 0x658dac6) 00:28:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x82b}, 0x14}}, 0x0) 00:28:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000200)) 00:28:37 executing program 3: mq_open(&(0x7f0000000140)='\xff?\xf3\xa21=\x1c\x86\x87R\x0e\n&q\xd6M+s\xc3\xd7\x18\xa7\xc2\xce\xe2jd\xc9\x94~\x96\a\'\x91d\x1d~\xf0\r\xfe\xf9\x98\x10\xb2\xac\xd4\xd4\xba\xb8\xac\x84 \xcf\x92\xfeM4!\x14\x05\x03?\x9c\xb0[\xb6\xff&\xed\xb4\xc6\bJE\xe8W\xa0\xf2\xb6\n\x16\x15u\xa2_1\t\x12q\xfb\xfa\x17\xe0J\x82\xf42\x1e\xcc\xc7\xba:\xfe\xa5;)\xf61G\x87aC\xe9\xbc\xec\xf8B\xc1:\x18\xfcf3\x12\x97\xef\x8cAr#\xa8\xcf\xea\x83\x84\xe3\xdb(9\x1a\x01>*E\x90Q\x8b^_\xbakt\xfcb\xc0%\x13\xe5t\x19F\x89\x8c\x9et8\xd7\x9es\x87\xfdf\x16e\xe2\x91\x84\xa7\xbbvv\x17?\r\xab*\xcdp\xd8vvQ>\xfcs\a\"!\x13\xfd|\xed\xb7\x1c1\xc2\xc0\xf6\x00\x01\xe3\xde\x0f&\xc4\x92H\xc3\xf6\x15\xe4\xc6\x87\xe15\x8b-o\xeb\xb0|\xefUh\xed|U\xcfwN1\xf7\xf6_\x9c\x96?\xdf\x10\xba\xc4\xf7\xc9\x9f3;\xe7\x03\x16\r}OSW-\xf7\xe2\xec\x05b\xa1P\t \x14\x83)9\x98\x86\xdd4-\x16\xbf\xe5\x92\xc1L\x92c\xd7L\x1b\x8a\xce\'\xfeM0\x14\x0e\x9e\x80\xbcl\xd0>?\x84Z\xb7\x15Mp\x10\x03\xb13(\xe3\x93\x81E\xc1\xb5\xb7d-h(\xf2d\xeb\xad\xb9\xd1!R\x85\x02\x9c\x00\x12N+\x98Z\x8eR\xbdb D\x17a\xf8.\t\xa4\b\v\xdc\xd8\xc6\xc4\xd6\x14\xcd]\xc8\xfd\xb0\xf1e+)7\x90\xec3\xf3\xea\xed7\x90Q(\"\xc7\x0f]\x14N\xd7\xbe', 0x0, 0x0, 0x0) 00:28:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x10ab}, 0x14) 00:28:37 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) 00:28:37 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 00:28:37 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)="c1", 0x1}, {&(0x7f00000001c0)="d9", 0x1}], 0x2, 0x0) 00:28:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fallocate(r0, 0x58, 0x0, 0x1) 00:28:38 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4042, 0x0) 00:28:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x20, 0x0, "fcfa464fcad7fd032a87900bd59c6697443b65279e04d067e300560478ecc35f738167b60176b4f6eb0fb244671fff49d9de605d84bf87a7e5c984e711e44661f8b673cdafd1b17e090acc43f24ebe86"}, 0xd8) 00:28:38 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) 00:28:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f00000000c0)) 00:28:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) 00:28:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000001240)='oom_score\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='fdinfo/3\x00') 00:28:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='#'], 0x1c) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 00:28:38 executing program 2: set_mempolicy(0x1, &(0x7f00000022c0)=0x8, 0x907) 00:28:38 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x808, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 00:28:38 executing program 5: sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0x40, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x39, 0x5, "eb65e22e14423a4949096beab641d793c31a4701f4f3ede862d5af4703254bc40c7a62e335298fb0be05d9600d824a5a845619b88e"}]}]}, 0x54}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ip_vti0\x00'}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)={'veth0_to_bridge\x00'}) 00:28:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002dc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 00:28:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000100)) 00:28:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r3 = dup2(r2, r1) sendfile(r0, r3, 0x0, 0x0) 00:28:38 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:38 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 00:28:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00') readv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/110, 0x6e}], 0x1) 00:28:38 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@loopback}, 0xfffffffffffffe91) 00:28:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x3}]}) 00:28:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x1}, 0x20) 00:28:38 executing program 1: io_setup(0x0, 0x0) io_setup(0x43fc, &(0x7f0000000340)) 00:28:38 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:38 executing program 5: rt_sigaction(0x26, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000007c0)) 00:28:38 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x1, 0x0) 00:28:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 00:28:39 executing program 5: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000740)=[{&(0x7f0000000540)=""/252, 0xfc}], 0x1, &(0x7f0000002940)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1, 0x0) 00:28:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000180)=0x5) 00:28:39 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 00:28:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='syscall\x00') readv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/110, 0x6e}], 0x1) 00:28:39 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:39 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000b74000/0x4000)=nil) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000fd2000/0x3000)=nil, 0xd000) shmat(r1, &(0x7f0000fd4000/0x1000)=nil, 0x4000) 00:28:39 executing program 5: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) pipe2(&(0x7f0000001900), 0x0) 00:28:39 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, 0xfffffffffffffffc) 00:28:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') readv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/110, 0x6e}], 0x1) 00:28:39 executing program 2: socket$inet6(0xa, 0x2, 0x1d) 00:28:39 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self\x00', 0x84200, 0x0) [ 434.306109][ T37] kauditd_printk_skb: 4 callbacks suppressed [ 434.306126][ T37] audit: type=1804 audit(1617496119.467:38): pid=12968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/138/bus" dev="sda1" ino=14061 res=1 errno=0 00:28:39 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000001280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB='$'], 0x1c}}, 0x0) recvmmsg(r0, &(0x7f0000001140)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/191, 0xbf}], 0x1}}], 0x1, 0x0, &(0x7f0000001240)) 00:28:39 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0, &(0x7f00000002c0)) 00:28:39 executing program 3: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) renameat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00') [ 434.596097][ T37] audit: type=1804 audit(1617496119.757:39): pid=12984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/139/bus" dev="sda1" ino=14322 res=1 errno=0 00:28:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x5, 0x0, &(0x7f0000000100)) 00:28:39 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x278001, 0x0) 00:28:39 executing program 5: r0 = getpgid(0x0) sched_getattr(r0, &(0x7f00000000c0)={0x38}, 0x38, 0x0) 00:28:39 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:40 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x0, 0x0) 00:28:40 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffff8) 00:28:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fremovexattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00') [ 434.909718][ T37] audit: type=1804 audit(1617496120.067:40): pid=13002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/140/bus" dev="sda1" ino=13889 res=1 errno=0 00:28:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000008c0)={&(0x7f0000000800), 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:28:40 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xfffffffffffffffc}, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 00:28:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:40 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmctl$IPC_RMID(r0, 0x0) 00:28:40 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:28:40 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x181082, 0x0) 00:28:40 executing program 5: r0 = fork() r1 = getpid() tkill(r0, 0x5) waitid(0x2, r1, &(0x7f0000000bc0), 0x4, &(0x7f0000000c40)) 00:28:40 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x8481, 0x0) 00:28:40 executing program 4: pipe2(&(0x7f00000002c0), 0x80800) [ 435.300379][ T37] audit: type=1804 audit(1617496120.457:41): pid=13020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/141/bus" dev="sda1" ino=14322 res=1 errno=0 00:28:40 executing program 1: socketpair(0x2, 0x0, 0x42d, 0x0) 00:28:40 executing program 3: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}}, &(0x7f0000000040)) 00:28:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x3}, 0x20) 00:28:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) 00:28:40 executing program 1: mq_open(&(0x7f0000000080)='}{\x00', 0x0, 0x0, 0x0) 00:28:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)={0xec4, 0x0, 0x3, 0x301, 0x0, 0x0, {}, [@generic="6c99968258d4336a5c75cc8230ddb7ac4c769de62a05557446e64a1e9104803c26c7822fdf91317c", @generic="c5af5b39db12a24a1307f4526fdccdc9a632756aaa4adfb7a13dece6783ebc361ef800c17c6bfb941a9f6081ce549db273744984edc572ff7cfbdef6294433cb6d7283648d", @typed={0xe3d, 0x0, 0x0, 0x0, @binary="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"}]}, 0xec4}}, 0x0) 00:28:40 executing program 3: sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0x40, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x39, 0x5, "eb65e22e14423a4949096beab641d793c31a4701f4f3ede862d5af4703254bc40c7a62e335298fb0be05d9600d824a5a845619b88e"}]}]}, 0x54}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ip_vti0\x00'}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)) [ 435.707765][ T37] audit: type=1804 audit(1617496120.867:42): pid=13042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/142/bus" dev="sda1" ino=14323 res=1 errno=0 00:28:40 executing program 4: mq_open(&(0x7f0000000000)='\xaefe\xf6\xc0\xe4\x86\xcf\xd5$\xe2\xb1\xc1\x9c\xe5J\xb1\xf6R\xcaY\xe4{q\xfa\xf0aJ\x95P\x85\x9e4\x03\xf8\xc6\xa0|\xab\xcf\x03\xe9\xad]\xd0G\x10\'\xba\xc0\xab\x0f\xdf\r\x0f\x9e\x01j\a\x80\x14\t\xdf\x85\xaa\x8en\xc9\xa7b\xb8\xffH', 0x0, 0x0, 0x0) 00:28:41 executing program 2: rt_sigaction(0x15, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000280)) [ 435.781613][T13048] netlink: 3760 bytes leftover after parsing attributes in process `syz-executor.5'. 00:28:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:41 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1040, 0x103) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x121800, 0x0) 00:28:41 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self\x00', 0x0, 0x0) 00:28:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000000180)) 00:28:41 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) shmat(r0, &(0x7f0000fd2000/0x3000)=nil, 0xd000) 00:28:41 executing program 2: timer_create(0x7, 0x0, &(0x7f0000000740)) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000800)={{}, {0x0, r0+10000000}}, 0x0) [ 436.054193][ T37] audit: type=1804 audit(1617496121.217:43): pid=13058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/143/bus" dev="sda1" ino=14327 res=1 errno=0 00:28:41 executing program 3: msgsnd(0x0, &(0x7f0000002500), 0x8, 0x0) 00:28:41 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/bus/input/devices\x00', 0x0, 0x0) 00:28:41 executing program 1: mq_open(&(0x7f0000000080)='}{\x00', 0x40, 0x0, &(0x7f00000000c0)={0x10000200, 0x20a5703b, 0x0, 0xfffffffffffffe01}) 00:28:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, 0x0) 00:28:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x38, &(0x7f00000000c0)={@local}, 0x14) 00:28:41 executing program 3: socket(0x2, 0x0, 0xffffffe1) 00:28:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x3a, &(0x7f00000000c0)={@local}, 0x14) 00:28:41 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x7}, 0x8) [ 436.408827][ T37] audit: type=1804 audit(1617496121.567:44): pid=13079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/144/bus" dev="sda1" ino=14334 res=1 errno=0 00:28:41 executing program 4: socket(0x25, 0x1, 0x10000) 00:28:41 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000002ec0)='ns/mnt\x00') 00:28:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:41 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x24100, 0x0) 00:28:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) bind$bt_hci(r0, 0x0, 0x0) 00:28:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x401, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 00:28:41 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000780)={'ip6tnl0\x00', 0x0}) 00:28:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x80108906, 0x0) 00:28:42 executing program 4: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000200)) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000280), 0x0, &(0x7f0000000300)) [ 436.848784][ T37] audit: type=1804 audit(1617496122.007:45): pid=13101 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/145/bus" dev="sda1" ino=14324 res=1 errno=0 00:28:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}}}}) 00:28:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x3c, 0x0, 0x0) 00:28:42 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:42 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/cgroup\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 00:28:42 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f0000000880)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "88392c78aa008381f432bd4658cb945f7df15dd07605d22cb89f684374e0e6637d6dcfecc4937effb4c9e235a0f80a5ce1bb5ed211235876496d8a3920af41"}, 0x60, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, &(0x7f0000000480)={0x28, 0x0, 0x0, "8cebf7d7af5afade26aeed49421cb3f0a9"}, 0x28}], 0x1, 0x4000081) 00:28:42 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x0) 00:28:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x35, 0x0, 0x0) 00:28:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000007480)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) [ 437.267292][ T37] audit: type=1804 audit(1617496122.428:46): pid=13120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/146/bus" dev="sda1" ino=14305 res=1 errno=0 00:28:42 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x1, 0x4) 00:28:42 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, 0x0) 00:28:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x30, 0x0, 0x0) 00:28:42 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000002780), 0x18) 00:28:42 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "37f155", 0x8}) 00:28:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x42, &(0x7f00000000c0)={@local}, 0x14) 00:28:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0xff24}}, 0x0) 00:28:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r1, 0x201, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 00:28:42 executing program 5: unshare(0x6c010100) [ 437.665792][ T37] audit: type=1804 audit(1617496122.828:47): pid=13140 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/147/bus" dev="sda1" ino=14100 res=1 errno=0 00:28:42 executing program 1: socketpair(0x0, 0x0, 0x8001, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f00000001c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) syz_genetlink_get_family_id$smc(&(0x7f0000001bc0)='SMC_PNETID\x00', 0xffffffffffffffff) 00:28:43 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:43 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8927, &(0x7f0000000780)={'ip6tnl0\x00', 0x0}) 00:28:43 executing program 4: sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:28:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000780)={'ip6tnl0\x00', 0x0}) 00:28:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x71}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x4c}}, 0x0) 00:28:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={0x0}}, 0x1) 00:28:43 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 00:28:43 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000780)={'ip6tnl0\x00', 0x0}) 00:28:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0xff24}}, 0x0) 00:28:43 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "37f155"}) 00:28:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x32, &(0x7f00000000c0)={@local}, 0x14) 00:28:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4e, &(0x7f00000000c0)={@local}, 0x14) [ 438.706998][T13189] ip6tnl0: mtu less than device minimum 00:28:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r3, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 00:28:44 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20480, 0x0) 00:28:44 executing program 1: mlock(&(0x7f0000f97000/0x4000)=nil, 0x4000) mlock(&(0x7f0000f9a000/0x2000)=nil, 0x2000) munmap(&(0x7f0000f97000/0x4000)=nil, 0x4000) 00:28:44 executing program 2: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 00:28:44 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@in={0x2, 0x3}, 0xc) [ 439.011421][T13204] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 00:28:44 executing program 4: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)) msync(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x4) 00:28:44 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) dup2(r1, r0) 00:28:44 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffff95, &(0x7f0000000180)=[@cred, @rights], 0x74}, 0x0) 00:28:44 executing program 5: mlock(&(0x7f0000f97000/0x4000)=nil, 0x4000) munmap(&(0x7f0000f95000/0x4000)=nil, 0x4000) [ 439.207067][T13204] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 00:28:44 executing program 4: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x3010, 0xffffffffffffffff, 0x0) 00:28:44 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 00:28:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x4, 0x0, 0x0) 00:28:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) readv(r0, &(0x7f0000001500)=[{0x0}], 0x1) 00:28:44 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 439.491988][ T37] audit: type=1804 audit(1617496124.648:48): pid=13230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/151/bus" dev="sda1" ino=14335 res=1 errno=0 00:28:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000f96000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) 00:28:44 executing program 3: mlock(&(0x7f0000f97000/0x4000)=nil, 0x4000) mlock(&(0x7f0000f95000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munlock(&(0x7f0000f9a000/0x1000)=nil, 0x1000) 00:28:44 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 00:28:44 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x3}, 0xc) 00:28:44 executing program 5: mlock(&(0x7f0000f97000/0x4000)=nil, 0x4000) mlock(&(0x7f0000f9a000/0x2000)=nil, 0x2000) munmap(&(0x7f0000f99000/0x5000)=nil, 0x5000) pipe(&(0x7f0000000000)) [ 439.691726][ T3252] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.771208][ T8531] Bluetooth: hci0: command 0x0401 tx timeout [ 439.790104][ T37] audit: type=1804 audit(1617496124.948:49): pid=13244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/152/bus" dev="sda1" ino=14335 res=1 errno=0 00:28:45 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f00000000c0)) 00:28:45 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000f96000/0x2000)=nil, 0x800000000, 0x2, 0x10, r0, 0x0) 00:28:45 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)=@un=@abs, 0x8, &(0x7f0000000500)=[{&(0x7f0000000340)=""/148, 0x94}, {&(0x7f0000000400)=""/252, 0xfc}], 0x237, &(0x7f0000000540)=""/125, 0x7d}, 0x0) 00:28:45 executing program 1: mlock(&(0x7f0000f97000/0x4000)=nil, 0x4000) mlock(&(0x7f0000f9a000/0x3000)=nil, 0x3000) msync(&(0x7f0000f97000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f0000f9a000/0x4000)=nil, 0x4000) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 00:28:45 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:45 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 00:28:45 executing program 3: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 00:28:45 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') [ 440.142375][ T37] audit: type=1804 audit(1617496125.308:50): pid=13264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/153/bus" dev="sda1" ino=14334 res=1 errno=0 00:28:45 executing program 5: socket(0x1f, 0x0, 0x7) 00:28:45 executing program 2: open$dir(&(0x7f0000000280)='\x00', 0x200, 0x0) 00:28:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a80)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 00:28:45 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:45 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) getpeername$inet(r0, 0x0, 0x0) 00:28:45 executing program 4: pipe(0x0) pipe2(&(0x7f0000000100), 0x400000) 00:28:45 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 00:28:45 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xa8) 00:28:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x70) [ 440.465825][ T37] audit: type=1804 audit(1617496125.628:51): pid=13280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/154/bus" dev="sda1" ino=13970 res=1 errno=0 00:28:45 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0, 0x68}}, 0x0) 00:28:45 executing program 5: socketpair(0x26, 0x5, 0xfffffff7, 0x0) 00:28:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 00:28:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 00:28:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) 00:28:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000300)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r0, &(0x7f0000000000)=ANY=[], 0x6) [ 440.780299][ T37] audit: type=1804 audit(1617496125.938:52): pid=13300 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/155/bus" dev="sda1" ino=14061 res=1 errno=0 00:28:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, 0x0, 0x0) 00:28:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xffffff5c) 00:28:46 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:46 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000300)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, 0x0, 0xd) 00:28:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xc, 0x0, &(0x7f0000000040)) 00:28:46 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000002bc0)='/dev/nvram\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000300)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r0, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x6) 00:28:46 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) [ 441.070463][ T37] audit: type=1804 audit(1617496126.228:53): pid=13321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/156/bus" dev="sda1" ino=14002 res=1 errno=0 00:28:46 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x70) 00:28:46 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000300)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="01"], 0x6) 00:28:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000300)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r0, 0x0, 0x5) 00:28:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, 0x0, 0x0) [ 441.358652][ T37] audit: type=1804 audit(1617496126.518:54): pid=13336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/157/bus" dev="sda1" ino=13889 res=1 errno=0 00:28:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) 00:28:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:46 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)="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", 0xec0}, {0x0}, {&(0x7f0000001180)="d4", 0x1}], 0x3}}, {{&(0x7f00000012c0)=@pppoe={0x18, 0x0, {0x0, @local, 'dummy0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 00:28:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x1600bd74, 0x0, &(0x7f0000000040)) 00:28:46 executing program 1: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x499605dc66912d11}, 0x10) 00:28:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000300)=@framed={{}, [], {0x95, 0x0, 0x0, 0xffffff9f}}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 441.697725][ T37] audit: type=1804 audit(1617496126.858:55): pid=13357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/158/bus" dev="sda1" ino=14067 res=1 errno=0 00:28:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x0, 0x4}, 0x40) 00:28:47 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x3f) ioctl$sock_SIOCOUTQ(r0, 0x8902, &(0x7f0000000040)) 00:28:47 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 441.850979][ T8531] Bluetooth: hci0: command 0x0401 tx timeout 00:28:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x3, &(0x7f0000000580)=@framed={{0x18, 0xa}}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:28:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x1600bd80, &(0x7f00000000c0)={@multicast2, @dev, @multicast2}, 0xc) 00:28:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000300)=@framed={{}, [@jmp={0x5, 0x1, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 442.064742][ T37] audit: type=1804 audit(1617496127.228:56): pid=13372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/159/bus" dev="sda1" ino=14351 res=1 errno=0 00:28:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1, 0x1, 0x41e, 0x6}, 0x40) 00:28:47 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x2, 0x0, 0x0) 00:28:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f0000000300)=""/33, &(0x7f0000000340)=0x21) 00:28:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14000, &(0x7f0000000140)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0xdc, &(0x7f00000001c0)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:47 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000001100)='batadv\x00', 0xffffffffffffffff) 00:28:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x4, 0x0, 0x0, 0x0, 0xffffffe4}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0xe337b37e31037f67, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 442.450840][ T37] audit: type=1804 audit(1617496127.608:57): pid=13392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/160/bus" dev="sda1" ino=14360 res=1 errno=0 00:28:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, 0x0, &(0x7f0000000040)) 00:28:47 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x3, &(0x7f0000000580)=@framed={{0x72}}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x2, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003"], &(0x7f0000000440)=""/246, 0x27, 0xf6, 0x1}, 0x20) 00:28:47 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000001100)='batadv\x00', 0xffffffffffffffff) 00:28:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000300)=@framed={{}, [], {0x95, 0x10}}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff0700}}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(r0, 0x5450, 0x0) 00:28:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000080)) 00:28:48 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x1}, 0x40) 00:28:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x1, &(0x7f0000000140)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}], &(0x7f0000000000)='syzkaller\x00', 0x2, 0xdc, &(0x7f00000001c0)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xe) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000640), 0x8) 00:28:48 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x3f) ioctl$sock_SIOCOUTQ(r0, 0x8915, &(0x7f0000000040)) 00:28:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x7, 0x4) 00:28:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x75}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 0: mknodat(0xffffffffffffffff, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r0, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000300)=@framed={{}, [@jmp={0x5, 0x1, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x1}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x4, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [0x68], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x40) 00:28:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x14}, 0x14}}, 0x0) 00:28:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x4, 0x0, 0x0, 0x0, 0xa6000000}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 0: mknodat(0xffffffffffffffff, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r0, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000080)=""/253, 0x26, 0xfd, 0x1}, 0x20) 00:28:48 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x3f) ioctl$sock_SIOCOUTQ(r0, 0x5451, 0x0) 00:28:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001100)='batadv\x00', 0xffffffffffffffff) 00:28:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x1d}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x6f}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xc, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 0: mknodat(0xffffffffffffffff, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r0, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:28:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x14, 0x0, 0x4}, 0x40) 00:28:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000300)=@framed={{}, [], {0x95, 0x7a}}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0x2}]}]}}, &(0x7f0000000100)=""/140, 0x32, 0x8c, 0x1}, 0x20) 00:28:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018230000", @ANYRES32, @ANYBLOB="6c81000000b7f0a300000000", @ANYRES32, @ANYBLOB="000000000100010018160000", @ANYRES32, @ANYBLOB="0000000000000000180000007f000000000000000200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)="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", 0xebf}, {&(0x7f0000001080)="a3", 0x1}, {&(0x7f0000001180)="d4", 0x1}], 0x3}}, {{&(0x7f00000012c0)=@pppoe={0x18, 0x0, {0x0, @local, 'dummy0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 00:28:49 executing program 0: r0 = open(0x0, 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, &(0x7f0000000540)) 00:28:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000140)={@loopback, @loopback}, 0xc) 00:28:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x24}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x60000000}, 0x0) 00:28:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x4, 0x2, 'vlan0\x00'}]}]}, 0x2c}}, 0x0) 00:28:49 executing program 0: r0 = open(0x0, 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x3f) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 00:28:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x14, 0x0, &(0x7f0000000040)) 00:28:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x1600bd74, 0x0, &(0x7f0000000040)=0x6) 00:28:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x13, 0x0, &(0x7f0000000040)) 00:28:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x4, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff000000}}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:49 executing program 0: r0 = open(0x0, 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:49 executing program 5: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:28:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000300)=@framed={{}, [@generic={0x54}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x3e0, 0x1b8, 0x1b8, 0xffffffff, 0x110, 0x260, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'wg0\x00', 'batadv_slave_0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'ip6erspan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @loopback, @local, @gre_key, @gre_key}}}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_1\x00'}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @loopback, @loopback, @icmp_id, @icmp_id}}}}, {{@ip={@private, @remote, 0x0, 0x0, 'ip6gre0\x00', 'vlan0\x00'}, 0x0, 0xb0, 0xe8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @broadcast, @icmp_id}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:28:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:50 executing program 2: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200)=0xffffffffffffffff, 0x4) 00:28:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 00:28:50 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x3f) ioctl$sock_SIOCOUTQ(r0, 0x2, &(0x7f0000000040)) 00:28:50 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 445.047334][T13530] x_tables: duplicate underflow at hook 1 00:28:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, 0x0, 0x0) 00:28:50 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x3f) ioctl$sock_SIOCOUTQ(r0, 0xc01047d0, 0x0) 00:28:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:28:50 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000080)={@random="e91198d7de91", @broadcast, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @broadcast, "edededcfaa65a06f80373577881a0e64"}}}}, 0x0) 00:28:50 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000001800), 0x10) 00:28:50 executing program 3: mlock(&(0x7f0000a82000/0x3000)=nil, 0x3000) munmap(&(0x7f0000800000/0x800000)=nil, 0x800000) 00:28:50 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:50 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fchmod(r0, 0x0) 00:28:50 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000080)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) 00:28:50 executing program 1: r0 = socket(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000140), 0x4) 00:28:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0x0, 0x0, &(0x7f00000017c0)="2720d15a19fb7cd086a383f6666ed62c22930c6fac957a1f2c25dcc2304ce8b946069ec54d0e30b62e0a41922aa6ca5ce0073123a8690c5255be37fcfdac0d9cf139f4b766c5e05b223ee8126d4e75c95fecb59385b498bbba59d7e900c9f11728ed2d0a8bc0be736024b0613af57edcd25c6a0396eaba96fa2bb8fa9e618880a1496179f478b4facd04d23cd1d9d755484870b17a88a1fd94baa5b4c2d2ee613a3da4996c8a79d3472f73659fcbf78c8a75bdae69e8327766ef950211a17cf263232a62f53461be9a1388b170e7a0b92c4b34280c457d08b8fd16dc6382c42340", 0xe1) 00:28:50 executing program 3: syz_emit_ethernet(0x7ff, &(0x7f0000000000)={@random="13acfc326905", @empty, @val, {@generic={0x0, "c68fc7a1b38e2c22c32ac6698abf84fd61f3caebb2c2e1876fe135ac99770dae992dd66450cfa9038b97fdfbd713aa541e5a8c70277cf778e300d6d2c4c630398478781b813d36e2bb87bd28095d4b34ad1867d30762725529198bffedd546381d1709888edc6e033457b23fc3adbbb8c67b6341856ff0fe74cc029024a1015dac8db31363b7a7e5b50b814357bf5a286bf178cabc39ba02b65e14ec733996b4b531003c82c8cc5e33315a7cf83b64a599cd868d4342466094be034f810bc205a5a5b1b9ea476aec1f9df84ab678b33bb60cb9a542cbaa064546d91d9d83cad81ec72f6ab096fb3ba0e67844cc837768d8be46ed550bd5c2bfd72292a024ac6f260a0b57b48c35ac5d3a8716dbbe3994309d0f872cf8bbd85ef6e6a57c4a861a7ce642b164fa1df1d658005c49b5a069cbc559e95029ee979ae1c7cb6ee3515b532f9166217458727dfba31e36207984bd4e409b6169136875413c9ea591a56dd70755cb93dd276d1ca9d75194a20207d12904dc01923daf017e9bf19eff0b4ce0fb696a468e9e48678b83e284a83e63451a76da0700ba9890eee574f80d9a91c793ae91c656f7f3c2c94c3b56b06a2c57c310ca66da58d59ae9c9a08a865f2e8f319d9ff892fab69f13c15aa5357fa129154ac5d8105350bd70daf434f1d804a107e68f094031504963be8f635a1cac3e8de7a2346b76c2eb262107f2342f29d0e4dc23712b9ddc0f8ef6cf741b3701b1598a5cd20e714efdfc136af55cb814dbc85ccaf5a7d8485348590f59edd22c914bc2755c60b7143e48be9dd087d7528c56f1fee7cd0d1fc9cd52eb6d569965084f61fa6cb153c2bec638b658dcea401385eff3298d8cd6923babc75d2a8e0661a2f3078d7464964e515571c9a1519b35a88e54acab96c846ff7a7304495329a66c6c90e63d0782483e5d47a8b5e2c2dcbe35f7173ee275204d17efd2434148a92f67b5f438ac210d4ec839109ce98743614c9fa6d5dd8c2c4d288c4e463e25a9f372230fe9916f82a2a4e5fba7932c2fdd28ae7c80f5085c3eb332b38e1a44f51ad2a3c9c343e8ae5e5031c8fa0ed2de3ec96a6a01c9aaf446a31a4256d9c9f757711f66b88b329a13de78da3620dda6631275a43cfa91ebf546c9e2a9976f21946e9e969fae1d8e2c66f69224c5f0f4c1b5720b589c57fab68d8b2047f0af10d2444709bc8fcdf6ec60f20f1ac6c06f14a71587a15db0fc46dc137491701bde220c1cece465eacd78e12711e4450beda4535802ab663bef4eae9f26690a1c618e92de7e9a4231aa0ecbe85656a5a75837d28d053faf857dec5c946822399f101c5a97612aa658b65debbc8077b1184ffefafb931ba5c8cae49f5cdc12a4bab0473e4e31e384df0ac83ec78c59921f21135db9b2ad31f9fa0684298d3a0ad946a5b730ae371885f741b3ab3f4e1fe2d7a4ab98fac1b705b1fb99a7e233266695ef093044c3d66493bde72da1a28469fa95f76ab2616f2b455b6d83ae5ad84af2f128eb85f78cb801c6ea7abbbaad3977082477dfc7f0f8814cbbca50afd1037edb63e9dd821b887e1cbd80c05071c094ecf6b672a6999f5becbbd40e471b7819f9707924f8ef5bac10b0d2702da64ce43aed02c4c42cb83326883b14e310d656af1ab0b9b9bfa484aeeb7e26fdbc9673538d79ab8cb90cfefcf9393ff0bcadf7ba323f3f59016e4cb5a2b57153624d2400108324ed013993622449e70f7e12bb42068770f7b2f31a205569fd2daed9633e9beaf9c7accade853c4310e083398b8ea444f6ba2f7a37584e2cde70fce6977c9dcf6e91ac39d20e3185ef8096c9113f5aa0d0a6e2c4537934aa43cbba6ac8e28eaf05224f03b1bc4a3574dfc82e5c6db8065443d0f1ceea40692a418607281b9fa56b7a00e9f6b5f89d09d5fea35349abed3b22af9e56d17e84c45f81b0424845ceeba72c0fce2136ffd69a1a6918060c5d6ffed833b33a65960a2f24c2dc2c6e15b51e8adb51f3da927b089dc7e052d883a272e2bae5991d1b5fdad404980b2226095511ba5a11390cc617adcc69b79a96363b59b0f85fef085306b12bc19ed0b9e09d09feb428c81747e16f4170311cfc688ad8ceb17589352d2c1a6bb70e9b0833d632a142c8c07cd2084a1068f51d1a853cf857d9a96e939ab587dc715e1ca984a63fac6694ecb64f180f0c02f113fefa14e96396becbb1fca099e6c80c3aedbb766fada9f3d511bde8866bb10630c093890159cbf083d78e06fee941ba266bb3863ccbf85214cea3341acdaddf4b4edc8400f82ba96038ec29b8d648ffe2a6aff3286199f07861b7ebc6179f4b788991c20bbfcdb54fd7a15b0314ff0f70bebede2a1e8f20bd13f0e27a17b40517f40d42d68ca13b6e954d294215cf04cab74b926a6307a1636dca31de52e0fbf500a824dd8fd71892fa5d38d741b95f6d0d3dcfdbb59db333fd4f6f7eca253217f4b2d0f8b60e64fb3945ee2d537b5d33e0c194430bf53ab09e193d03711ad1bf54c2f37ab74f2e47e67a8e9fbd63f56fc9a63f48f753d2e2ad8356637e96a39d5b0286148b6109495d0ab265340c127538ecfb4d7dc5ba07b3c07ab35428cf94abe56e6a89cdff5cd33e6bc2eaaa4df12a883f54dfdf083494b712408a78e5ff1d25e3007423467ff23ea01bb2494aafb9df89bdd3065c2f4fb882f2c916a29fb24d91b87bdace9abc2d72558ef92efb7dace0c5bc7c17ebc3b7698a5f82b715c5028ed0f809d08ae85576eaa23253aa836f0d2bcd419ad9776b4ccd955f7bf206dafa31c035862528cd4be1209a25cae0a7d434acb00d18689477a1f047c5bcdd0c15038eef02493e2c74325bf69448cd123cab49aae9f77641e2b60ea6"}}}, 0x0) 00:28:50 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:50 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 00:28:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/64, 0x4b}, {&(0x7f0000000200)=""/38, 0xffffffffffffff86}], 0x2, &(0x7f0000000080)=""/9}, 0x0) 00:28:50 executing program 1: syz_emit_ethernet(0xe, &(0x7f00000000c0)={@broadcast, @random="d4c2b2eea9b0", @val, {@ipv4}}, 0x0) 00:28:50 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x20290, 0x0) chown(&(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0) 00:28:50 executing program 3: syz_emit_ethernet(0xe, &(0x7f0000000280)={@empty=[0x5], @local, @val, {@ipv6}}, 0x0) 00:28:51 executing program 5: syz_emit_ethernet(0xe, &(0x7f0000000000)={@random="13acfc326905", @empty, @val, {@generic={0x8035}}}, 0x0) 00:28:51 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:51 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000001140)={@local, @local, @val, {@arp={0x806, @generic={0x1, 0x0, 0x6, 0x0, 0x0, @local, "", @local, "558a2fc64a6abe8f5be25fac7c4fcc00"}}}}, 0x0) 00:28:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=[{0xb0, 0x0, 0x0, "7945f3bde4c00f0b321402eb494c862c95ebbc2521b6761774efb6fd0fe018424ae33ca3cf2183d463f1309a44b5a1962286a51d467353a60e03c49791dd9b6172a8518f5d26eae9a9d0f7734f63c4af642b2488047653d8b33d76e9565b44e4306b9640b6d0ac565dd4b48a2a72e4bfe6bda810c2960f70bdce13607aaefcf945e19346b13e2cb14d7014c375275123846206dc039dfd7443"}, {0x38, 0x0, 0x0, "1cc7b1e449c94745ea7bdbd392b7345e223c7ce57a444bd2b08f02894ec946d451"}, {0xb0, 0x0, 0x0, "2c7fbe2b1d089298a5679b1de60bf2e228ef8ddaf78e427b2d750a52b0a70240f98a6d0516234258c599778c387928cd35c89ed86ee1a752f1493ca27bcd5955630d74fdf4083808ff4cbe93942abf4aef115a83fd184d3372faf711f55a48c80e69870f8bb6913f4bd9cf3f8f84cf37ac6a316ad334be66bf30837ee9daf253b25eddbf9e3968c702f9f18f5fafbae7728321bd567ea2d426"}, {0x670, 0x0, 0x0, "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"}], 0x808}, 0x0) 00:28:51 executing program 1: syz_emit_ethernet(0x4a, &(0x7f00000006c0)={@local, @remote, @val, {@ipv6}}, 0x0) 00:28:51 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x2, &(0x7f0000000080)) 00:28:51 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 446.119352][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 446.119369][ T37] audit: type=1804 audit(1617496131.278:60): pid=13587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/172/bus" dev="sda1" ino=14385 res=1 errno=0 00:28:51 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000680)=""/4096, 0x1000}, 0x841) 00:28:51 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8a00, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:28:51 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 00:28:51 executing program 3: r0 = socket(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1023, &(0x7f0000000080), 0x4) 00:28:51 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) 00:28:51 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 00:28:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) clock_gettime(0x4, &(0x7f0000000000)) [ 446.459377][ T37] audit: type=1804 audit(1617496131.618:61): pid=13604 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/173/bus" dev="sda1" ino=14002 res=1 errno=0 00:28:51 executing program 4: open$dir(&(0x7f0000000000)='.\x00', 0x1, 0x0) 00:28:51 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000280)={@empty=[0x5], @local, @val, {@ipv6}}, 0x0) 00:28:51 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:51 executing program 5: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc5e01ab0572dbf1f, 0x10, 0xffffffffffffffff, 0x0) 00:28:51 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000280)={@empty=[0x5], @local, @val, {@ipv6}}, 0x0) 00:28:51 executing program 2: ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000080)={0x0, 0x100, 0x1}) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f00000000c0)) read$hiddev(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000240)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000300)={0x1, 0x0, 0x9, 0x1, 0x200, 0x0, 0x6, 0x4524, 0x4, 0x400, 0x0, 0x1000, 0x1158}) read$hiddev(0xffffffffffffffff, &(0x7f0000000340)=""/84, 0x54) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f00000003c0)) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000400)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000480)={0x3, 0x100, 0x2}) syz_open_dev$hiddev(&(0x7f00000004c0)='/dev/usb/hiddev#\x00', 0x3, 0x0) 00:28:51 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000001d00)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xff, "", {{{0x9, 0x5, 0x1, 0x2, 0x10}}}}}]}}]}}, 0x0) 00:28:51 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6a3, 0xccb, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x7}}}}}]}}]}}, 0x0) syz_usb_connect(0x0, 0xa9, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0xa1, 0x40, 0xc1, 0xff, 0x2013, 0x25e, 0x4b17, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x97, 0x3, 0x0, 0x5, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x7, 0x3, 0xb, 0x79, 0xc2, 0x0, [], [{}, {{0x9, 0x5, 0x80, 0x3, 0x20, 0x3, 0x80, 0x20}}, {{0x9, 0x5, 0x0, 0x0, 0x0, 0x80, 0x3}}]}}, {{0x9, 0x4, 0xf3, 0x0, 0x4, 0xff, 0x8f, 0x75, 0x0, [], [{{0x9, 0x5, 0x0, 0x3, 0x40, 0x0, 0x3, 0x81, [@uac_iso={0x7}]}}, {{0x9, 0x5, 0x0, 0x0, 0xadedb46c97af77ad, 0x1}}, {}, {{0x9, 0x5, 0x0, 0x0, 0x0, 0x8, 0x8}}]}}, {{0x9, 0x4, 0x0, 0x0, 0x5, 0xf8, 0xa, 0xeb, 0x0, [], [{{0x9, 0x5, 0x10b, 0x0, 0x0, 0x0, 0x2}}, {}, {{0x9, 0x5, 0x0, 0x1, 0x0, 0x1}}, {{0x9, 0x5, 0x0, 0x1, 0x0, 0x0, 0x81, 0x40}}, {}]}}]}}]}}, 0x0) [ 446.795486][ T37] audit: type=1804 audit(1617496131.958:62): pid=13620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/174/bus" dev="sda1" ino=14126 res=1 errno=0 00:28:52 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, 0x0, 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:52 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000800)={{0x12, 0x1, 0x0, 0x4c, 0xa7, 0xb2, 0x20, 0x1b3d, 0x18f, 0x9877, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x81, 0x0, 0x0, [{{0x9, 0x4, 0x3a, 0x80, 0x1, 0xa4, 0x91, 0x16, 0x0, [], [{{0x9, 0x5, 0x4}}]}}]}}]}}, &(0x7f0000000c40)={0xa, &(0x7f0000000880)={0xa}, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000ac0)=@string={0x2}}, {0x14, &(0x7f0000000b80)=@string={0x14, 0x3, "fecff2303ccabbea912ea9f586c9e788cede"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000dc0)={0x14, 0x0, &(0x7f0000000d80)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 00:28:52 executing program 1: syz_usb_connect$uac1(0x2, 0x7a, &(0x7f00000001c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x68, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000640)={0xa, &(0x7f00000002c0)={0xa}, 0x3e, &(0x7f0000000300)={0x5, 0xf, 0x3e, 0x4, [@ss_cap={0xa}, @ext_cap={0x7, 0x10, 0x2, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "e152754daae5504020358285fd8632c9"}, @ssp_cap={0x14, 0x10, 0xa, 0x0, 0x2, 0x0, 0x0, 0x0, [0x0, 0x0]}]}, 0x4, [{0x2, &(0x7f0000000400)=@string={0x2}}, {0x0, 0x0}, {0x1c, &(0x7f0000000480)=@string={0x1c, 0x3, "c1e12837d186da83e574c00426569652ea12c82994ce50e707dd"}}, {0x23, &(0x7f0000000540)=@string={0x23, 0x3, "c07fc48974f8966390954ea956d7b2facba6fe68aa0aaa756e51d35295d830ed2d"}}]}) [ 447.031064][ T37] audit: type=1804 audit(1617496132.188:63): pid=13637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/175/bus" dev="sda1" ino=14161 res=1 errno=0 00:28:52 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, 0x0, 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 447.150863][ T8531] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 447.220605][ T20] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 447.241577][ T9587] usb 5-1: new high-speed USB device number 7 using dummy_hcd 00:28:52 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, 0x0, 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 447.276024][ T37] audit: type=1804 audit(1617496132.438:64): pid=13645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/176/bus" dev="sda1" ino=14161 res=1 errno=0 [ 447.303197][T12037] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 447.311029][T12035] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 447.424101][ T37] audit: type=1804 audit(1617496132.588:65): pid=13648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/177/bus" dev="sda1" ino=14161 res=1 errno=0 00:28:52 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 447.546945][ T37] audit: type=1804 audit(1617496132.708:66): pid=13651 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/178/bus" dev="sda1" ino=14161 res=1 errno=0 [ 447.547728][ T9587] usb 5-1: Using ep0 maxpacket: 8 [ 447.574665][T12037] usb 6-1: Using ep0 maxpacket: 32 [ 447.611498][ T20] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 00:28:52 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 447.703323][ T8531] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 447.714262][T12037] usb 6-1: config 0 has an invalid interface number: 58 but max is 0 [ 447.732159][ T9587] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 447.736044][T12037] usb 6-1: config 0 has no interface number 0 [ 447.753856][T12035] usb 2-1: not running at top speed; connect to a high speed hub [ 447.764208][ T8531] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 447.783173][ T8531] usb 3-1: Product: syz [ 447.788202][ T8531] usb 3-1: Manufacturer: syz [ 447.796070][T12037] usb 6-1: config 0 interface 58 altsetting 128 endpoint 0x4 has invalid wMaxPacketSize 0 [ 447.807150][ T8531] usb 3-1: SerialNumber: syz [ 447.813860][ T20] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 447.824684][T12037] usb 6-1: config 0 interface 58 has no altsetting 0 [ 447.834940][ T20] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 447.845500][ T20] usb 4-1: Product: syz [ 447.856890][ T20] usb 4-1: Manufacturer: syz [ 447.863983][T12035] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 447.873120][ T37] audit: type=1804 audit(1617496133.028:67): pid=13654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/179/bus" dev="sda1" ino=14161 res=1 errno=0 [ 447.874660][ T8531] usb 3-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 447.906640][T12037] usb 6-1: language id specifier not provided by device, defaulting to English [ 447.918955][ T20] usb 4-1: SerialNumber: syz [ 447.930694][T12035] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 447.943666][T12035] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 447.961621][ T9587] usb 5-1: New USB device found, idVendor=06a3, idProduct=0ccb, bcdDevice= 0.40 [ 447.973623][T13630] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 447.989193][ T9587] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 447.992458][T12035] usb 2-1: language id specifier not provided by device, defaulting to English 00:28:53 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 448.023519][ T9587] usb 5-1: Product: syz [ 448.038119][ T9587] usb 5-1: Manufacturer: syz [ 448.048785][ T9587] usb 5-1: SerialNumber: syz [ 448.062072][T12037] usb 6-1: New USB device found, idVendor=1b3d, idProduct=018f, bcdDevice=98.77 [ 448.085380][T12037] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 448.103673][T12037] usb 6-1: Product: syz [ 448.109248][T12037] usb 6-1: Manufacturer: 쿾ヲ쨼⺑즆裧 [ 448.111171][ T9587] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 448.123399][T12037] usb 6-1: SerialNumber: syz [ 448.143898][T12037] usb 6-1: config 0 descriptor?? [ 448.180314][ T37] audit: type=1804 audit(1617496133.338:68): pid=13663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/180/bus" dev="sda1" ino=14161 res=1 errno=0 [ 448.244792][ T20] usb 4-1: USB disconnect, device number 10 00:28:53 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 448.317065][T13631] udc-core: couldn't find an available UDC or it's busy [ 448.343138][T13631] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 448.362131][T12035] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 448.378066][T12035] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 448.399731][T12035] usb 2-1: Product: 㜨蛑菚瓥Ӏ嘦劖ዪ⧈캔 [ 448.415483][T12035] usb 2-1: SerialNumber: 翀规掖閐ꥎ흖者ꛋ棾પ疪兮勓 [ 448.416719][ T37] audit: type=1804 audit(1617496133.578:69): pid=13678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/181/bus" dev="sda1" ino=14161 res=1 errno=0 [ 448.445598][T12037] ftdi_sio 6-1:0.58: FTDI USB Serial Device converter detected [ 448.457130][ T2954] usb 5-1: USB disconnect, device number 7 [ 448.486148][T12037] usb 6-1: Detected FT-X [ 448.496103][T12037] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 4 [ 448.630612][ T8531] usb 3-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 448.651839][T12037] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 448.670542][T12037] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 448.700837][T12037] ftdi_sio 6-1:0.58: GPIO initialisation failed: -71 [ 448.715892][T12037] usb 6-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 448.747380][T12037] usb 6-1: USB disconnect, device number 3 [ 448.771406][T12037] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 448.783131][T12037] ftdi_sio 6-1:0.58: device disconnected [ 448.790871][T12035] usb 2-1: 0:2 : does not exist [ 448.838912][T13625] udc-core: couldn't find an available UDC or it's busy [ 448.842172][T12035] usb 2-1: USB disconnect, device number 4 [ 448.855805][T13625] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 448.903958][ T4875] usb 3-1: USB disconnect, device number 6 [ 449.040580][ T2954] usb 4-1: new high-speed USB device number 11 using dummy_hcd [ 449.161790][ T9587] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 449.411376][ T2954] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 449.413666][T13729] udc-core: couldn't find an available UDC or it's busy [ 449.424697][ T20] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 449.433340][ T9587] usb 5-1: Using ep0 maxpacket: 8 [ 449.448665][T13729] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 00:28:54 executing program 2: ioctl$HIDIOCGNAME(0xffffffffffffffff, 0x80404806, &(0x7f0000000000)) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000080)={0x0, 0x100, 0x1}) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f00000000c0)) read$hiddev(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000000180)) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000000200)) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000240)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000300)={0x1, 0x0, 0x9, 0x1, 0x200, 0x0, 0x6, 0x4524, 0x4, 0x400, 0x0, 0x1000, 0x1158, 0x7fffffff}) read$hiddev(0xffffffffffffffff, &(0x7f0000000340)=""/84, 0x54) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f00000003c0)) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000400)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000480)={0x3, 0x100, 0x2}) syz_open_dev$hiddev(&(0x7f00000004c0)='/dev/usb/hiddev#\x00', 0x3, 0x8000) [ 449.500721][T12035] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 449.591700][ T9587] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 449.615330][ T2954] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 449.633740][ T2954] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 449.647074][ T2954] usb 4-1: Product: syz [ 449.656662][ T2954] usb 4-1: Manufacturer: syz [ 449.666430][ T2954] usb 4-1: SerialNumber: syz [ 449.680664][ T20] usb 6-1: Using ep0 maxpacket: 32 [ 449.691553][ T8531] ath9k_htc 3-1:1.0: ath9k_htc: Target is unresponsive [ 449.698709][ T8531] ath9k_htc: Failed to initialize the device [ 449.708842][T13630] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 449.718727][ T4875] usb 3-1: ath9k_htc: USB layer deinitialized [ 449.801217][ T20] usb 6-1: config 0 has an invalid interface number: 58 but max is 0 [ 449.809342][ T20] usb 6-1: config 0 has no interface number 0 [ 449.821318][ T9587] usb 5-1: New USB device found, idVendor=06a3, idProduct=0ccb, bcdDevice= 0.40 [ 449.878893][ T20] usb 6-1: config 0 interface 58 altsetting 128 endpoint 0x4 has invalid wMaxPacketSize 0 [ 449.890911][ T9587] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 449.910505][T12035] usb 2-1: not running at top speed; connect to a high speed hub [ 449.937774][ T9587] usb 5-1: Product: syz 00:28:55 executing program 3: io_setup(0x9, &(0x7f0000009bc0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 00:28:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240)='NLBL_MGMT\x00', r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x20, r2, 0x103, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xc, 0x1, '^%w%/-+\x00'}]}, 0x20}}, 0x0) [ 449.991162][T12035] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 449.991683][ T9587] usb 5-1: Manufacturer: syz [ 450.005485][ T20] usb 6-1: config 0 interface 58 has no altsetting 0 [ 450.023386][T12035] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 450.054364][ T2954] usb 4-1: USB disconnect, device number 11 00:28:55 executing program 5: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f00000003c0)={0x0, 0x0, 0x10, &(0x7f0000000100)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb}]}, 0x1, [{0x0, 0x0}]}) [ 450.097785][ T9587] usb 5-1: SerialNumber: syz [ 450.101411][T12035] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 450.120667][ T4875] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 450.170955][ T20] usb 6-1: string descriptor 0 read error: -71 [ 450.177532][ T20] usb 6-1: New USB device found, idVendor=1b3d, idProduct=018f, bcdDevice=98.77 [ 450.189457][T12035] usb 2-1: language id specifier not provided by device, defaulting to English [ 450.198652][ T9587] usb 5-1: can't set config #1, error -71 [ 450.211709][ T9587] usb 5-1: USB disconnect, device number 8 [ 450.244279][ T20] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 450.295504][ T20] usb 6-1: config 0 descriptor?? [ 450.331135][ T20] usb 6-1: can't set config #0, error -71 00:28:55 executing program 1: io_setup(0x9, &(0x7f0000009bc0)) io_setup(0x4, &(0x7f0000000240)=0x0) io_destroy(r0) 00:28:55 executing program 4: r0 = socket(0x23, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:28:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000003f0000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 450.373988][ T20] usb 6-1: USB disconnect, device number 4 00:28:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 450.480518][T12035] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 00:28:55 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x59, 0x40040) [ 450.527637][T12035] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 450.600611][T12035] usb 2-1: can't set config #1, error -71 [ 450.614327][T12035] usb 2-1: USB disconnect, device number 5 00:28:55 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/consoles\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, 0x0) 00:28:55 executing program 3: clone3(&(0x7f0000002140)={0x400, 0x0, 0x0, 0x0, {}, &(0x7f0000001fc0)=""/158, 0x9e, 0x0, &(0x7f0000002100)=[0xffffffffffffffff], 0x1}, 0x58) [ 450.711530][ T4875] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 450.736086][ T4875] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 450.774035][ T4875] usb 3-1: Product: syz [ 450.786758][ T4875] usb 3-1: Manufacturer: syz [ 450.800733][ T20] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 450.803400][ T4875] usb 3-1: SerialNumber: syz [ 450.881315][ T4875] usb 3-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 451.040548][ T20] usb 6-1: Using ep0 maxpacket: 8 [ 451.161139][ T20] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 451.169861][ T20] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 451.190551][ T20] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 451.431173][ T20] usb 6-1: string descriptor 0 read error: -22 [ 451.437477][ T20] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 451.502292][ T20] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 451.540719][ T4875] usb 3-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 451.603545][ T20] usb 6-1: 0:2 : does not exist [ 451.748880][T13735] udc-core: couldn't find an available UDC or it's busy [ 451.760420][T13735] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 451.802326][ T9659] usb 3-1: USB disconnect, device number 7 [ 451.806439][ T20] usb 6-1: USB disconnect, device number 5 [ 452.620390][ T9587] usb 6-1: new high-speed USB device number 6 using dummy_hcd [ 452.660598][ T4875] ath9k_htc 3-1:1.0: ath9k_htc: Target is unresponsive [ 452.667914][ T4875] ath9k_htc: Failed to initialize the device [ 452.675482][ T9659] usb 3-1: ath9k_htc: USB layer deinitialized [ 452.870424][ T9587] usb 6-1: Using ep0 maxpacket: 8 00:28:58 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/slabinfo\x00', 0x0, 0x0) 00:28:58 executing program 1: r0 = socket(0xa, 0x3, 0xff) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 00:28:58 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:58 executing program 4: r0 = epoll_create(0xfff) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, &(0x7f00000000c0)={[0xea1]}, 0x8) [ 453.021414][ T9587] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 453.034450][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 453.034465][ T37] audit: type=1804 audit(1617496138.198:72): pid=13839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/184/bus" dev="sda1" ino=14162 res=1 errno=0 [ 453.036845][ T9587] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 453.120385][ T9587] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 00:28:58 executing program 5: clone3(&(0x7f0000000c00)={0x11010000, 0x0, 0x0, 0x0, {0x35}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:28:58 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:58 executing program 3: openat$mice(0xffffffffffffff9c, &(0x7f0000001040)='/dev/input/mice\x00', 0x40000) 00:28:58 executing program 2: r0 = fork() process_vm_writev(r0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000001140)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000940)=[{&(0x7f0000000600)=""/176, 0xb0}, {&(0x7f00000006c0)=""/13, 0xd}], 0x2, 0x0) 00:28:58 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000001100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x26) 00:28:58 executing program 1: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x80000001) [ 453.330416][ T9587] usb 6-1: string descriptor 0 read error: -71 [ 453.336706][ T9587] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 453.380471][ T9587] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 453.399257][ T37] audit: type=1804 audit(1617496138.558:73): pid=13850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/185/bus" dev="sda1" ino=14405 res=1 errno=0 00:28:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@ptr, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @enum={0x9}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000340)=""/149, 0x47, 0x95, 0x1}, 0x20) [ 453.435542][ T9587] usb 6-1: can't set config #1, error -71 [ 453.468913][ T9587] usb 6-1: USB disconnect, device number 6 00:28:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x2c, r2, 0x1, 0x0, 0x0, {0x4}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x2c}}, 0x0) 00:28:58 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:58 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0), 0x4) 00:28:58 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001f80)='/proc/locks\x00', 0x0, 0x0) write$usbip_server(r0, 0x0, 0x0) 00:28:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@ptr, @const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000340)=""/149, 0x46, 0x95, 0x1}, 0x20) 00:28:58 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "329d8530"}, 0x0, 0x0, @planes=0x0}) [ 453.698178][ T37] audit: type=1804 audit(1617496138.858:74): pid=13870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/186/bus" dev="sda1" ino=14402 res=1 errno=0 00:28:58 executing program 5: syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0xffffffffffffffe1, 0x101) 00:28:59 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:59 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42140, 0x51) 00:28:59 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xa000, 0x1) 00:28:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 00:28:59 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fstat(r0, &(0x7f0000006200)) 00:28:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x51) 00:28:59 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1, 0xc) [ 454.026167][ T37] audit: type=1804 audit(1617496139.188:75): pid=13889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/187/bus" dev="sda1" ino=14409 res=1 errno=0 00:28:59 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101140, 0x295) 00:28:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) 00:28:59 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:59 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101140, 0x0) fcntl$getown(r0, 0x9) [ 454.205287][ T37] audit: type=1804 audit(1617496139.368:76): pid=13896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir315416325/syzkaller.66itFL/200/file0" dev="sda1" ino=14402 res=1 errno=0 00:28:59 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) fcntl$getown(r0, 0x9) 00:28:59 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000001180)='./file0\x00', 0x181940, 0x0) 00:28:59 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) 00:28:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@fat=@sys_immutable='sys_immutable'}, {@fat=@tz_utc='tz=UTC'}]}) [ 454.363978][ T37] audit: type=1804 audit(1617496139.528:77): pid=13904 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/188/bus" dev="sda1" ino=14397 res=1 errno=0 00:28:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @rand_addr=0x64010101}, {0x2, 0x0, @broadcast}, 0xa3}) 00:28:59 executing program 5: capset(&(0x7f0000000040)={0x20071026, 0xffffffffffffffff}, 0x0) 00:28:59 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:28:59 executing program 4: r0 = gettid() capset(&(0x7f00000002c0)={0x19980330, r0}, &(0x7f0000000300)={0xfffffff8}) 00:28:59 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1f, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) [ 454.593477][T13919] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure [ 454.607734][T13914] FAT-fs (loop2): bogus number of reserved sectors 00:28:59 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x48be, 0x8001, 0x3, 0x0, 0x1, 0x400}, 0x0) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000100)) pipe(&(0x7f0000000380)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x1}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 454.686881][T13914] FAT-fs (loop2): Can't find a valid FAT filesystem [ 454.711661][ T37] audit: type=1804 audit(1617496139.878:78): pid=13922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/189/bus" dev="sda1" ino=14410 res=1 errno=0 00:28:59 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 00:28:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x40) [ 454.732812][T13927] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 00:29:00 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 454.793977][T13914] FAT-fs (loop2): bogus number of reserved sectors [ 454.800946][T13914] FAT-fs (loop2): Can't find a valid FAT filesystem 00:29:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)=0xffffffffffffffc4) 00:29:00 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) 00:29:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@noextend='noextend'}, {@cache_mmap='cache=mmap'}, {@version_L='version=9p2000.L'}, {@cachetag={'cachetag', 0x3d, '/dev/hwrng\x00'}}]}}) [ 454.945698][ T37] audit: type=1804 audit(1617496140.108:79): pid=13939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/190/bus" dev="sda1" ino=14417 res=1 errno=0 00:29:00 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:00 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 00:29:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 00:29:00 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f00000038c0)={&(0x7f0000003880)={0x10}, 0x10}}, 0x0) [ 455.205672][ T37] audit: type=1804 audit(1617496140.368:80): pid=13952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/191/bus" dev="sda1" ino=14417 res=1 errno=0 [ 455.225809][T13954] 9pnet: Insufficient options for proto=fd 00:29:00 executing program 2: io_uring_setup(0x0, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'batadv_slave_1\x00'}) 00:29:00 executing program 5: setreuid(0xee01, 0xee00) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/hwrng\x00', 0x0, 0x0) 00:29:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, 0x0, 0x0) 00:29:00 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:00 executing program 3: r0 = epoll_create(0x1) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x70002010}) 00:29:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x28}}, 0x0) [ 455.477961][T13967] batadv_slave_1: mtu less than device minimum [ 455.484408][ T37] audit: type=1804 audit(1617496140.638:81): pid=13966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/192/bus" dev="sda1" ino=14414 res=1 errno=0 00:29:00 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f000000bdc0)={&(0x7f000000bd00), 0xc, &(0x7f000000bd80)={&(0x7f000000bd40)={0x14, 0x453, 0x0, 0x0, 0x0, 'b'}, 0x14}}, 0x0) [ 455.560026][T13971] batadv_slave_1: mtu less than device minimum 00:29:00 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f00000001c0)) 00:29:00 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:29:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000b40)={'wpan1\x00'}) 00:29:00 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x880) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={0x0, 0x0}) 00:29:01 executing program 4: io_cancel(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 00:29:01 executing program 1: epoll_pwait(0xffffffffffffffff, &(0x7f0000001040)=[{}], 0x1, 0x0, &(0x7f00000010c0)={[0x9548]}, 0x8) 00:29:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r0, &(0x7f0000001a00)=ANY=[], 0x3) fdatasync(r1) 00:29:01 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:01 executing program 3: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 00:29:01 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb701, 0x0) 00:29:01 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) pipe2(&(0x7f0000000a80), 0x0) mmap$xdp(&(0x7f0000ffb000/0x1000)=nil, 0x1e116000, 0x0, 0x12, r0, 0x0) 00:29:01 executing program 1: syz_io_uring_complete(0x0) io_setup(0x5, &(0x7f00000001c0)) 00:29:01 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x109040, 0x0) 00:29:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0xffffff30) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ppoll(&(0x7f0000000240)=[{}, {r2}], 0x2, 0x0, 0x0, 0x0) 00:29:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) pipe(&(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x2}, 0x0, &(0x7f0000000300)={0x0, r0+60000000}, 0x0) 00:29:01 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/126, 0x7e) 00:29:01 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:01 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb703, 0x0) 00:29:01 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) 00:29:01 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000), 0xffffffffffffffcc) 00:29:01 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 00:29:01 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, 0x0) 00:29:02 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:02 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 00:29:02 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000100)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 00:29:02 executing program 5: epoll_create(0x1) r0 = socket$nl_audit(0x10, 0x3, 0x9) io_uring_setup(0x77e1, &(0x7f00000000c0)={0x0, 0x9bf7, 0x5, 0x2, 0x360}) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x3f9, 0x400, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x880}, 0x200400a1) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x189242, 0x0) getgroups(0x1, &(0x7f0000000340)=[0xee00]) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000240)={'batadv_slave_1\x00'}) 00:29:02 executing program 4: setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, 0x0, 0xff600000) 00:29:02 executing program 1: r0 = epoll_create(0x1) r1 = socket$nl_audit(0x10, 0x3, 0x9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x10000005}) 00:29:02 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f000000bdc0)={&(0x7f000000bd00), 0xc, &(0x7f000000bd80)={&(0x7f000000bd40)={0x18, 0x453, 0x30, 0x0, 0x0, "6245af8315"}, 0x18}}, 0x0) 00:29:02 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:02 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0xffffff30) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:29:02 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000380)=""/4096) 00:29:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x107, 0xb, 0x0, &(0x7f0000000200)) 00:29:02 executing program 4: io_setup(0x5, &(0x7f00000001c0)=0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x3, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0]) [ 457.452994][T14062] batadv_slave_1: mtu less than device minimum 00:29:02 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:02 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r0, &(0x7f0000001200)=[{{&(0x7f0000000000)=@xdp, 0x80, 0x0}}], 0x1, 0x22, 0x0) [ 457.505921][T14065] batadv_slave_1: mtu less than device minimum 00:29:02 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0x541b, &(0x7f0000000140)) 00:29:02 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000080)) 00:29:02 executing program 1: r0 = epoll_create(0x1) epoll_wait(r0, &(0x7f0000000240)=[{}], 0x1, 0x7fffffff) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x0) io_cancel(0x0, 0x0, 0x0) 00:29:02 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x1000)=nil, 0x7fffdf004000, 0x0, 0x12, r0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/231, 0x8000, 0x800}, 0x20) 00:29:02 executing program 5: io_setup(0x5, &(0x7f00000001c0)=0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:29:02 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:29:03 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000180)='gtp\x00', r0) 00:29:03 executing program 5: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080), &(0x7f00000000c0)={'enc=', 'raw', ' hash=', {'sha512\x00'}}, 0x0, 0x0) 00:29:03 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:03 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 458.343568][ T37] kauditd_printk_skb: 9 callbacks suppressed [ 458.343585][ T37] audit: type=1804 audit(1617496143.498:91): pid=14100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/200/bus" dev="sda1" ino=14434 res=1 errno=0 00:29:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x662, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1269, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "96d19adee86766e1f182cfec1a8340dfee9397f7aca24bf42feb69d3f7850666a0be21d03058d7008286315f4ac40e3980c19718c59ca7ad37c694ed39cbd0ef", "d2593905da77b06929aec0020069de4e7e925a0e5610cecdf786daa39c482267"}) 00:29:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='fu_c=PATH_CHECK,subj_role=:\',context=']) 00:29:03 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:03 executing program 1: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}]}}) 00:29:03 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000001000)) [ 458.717654][ T37] audit: type=1804 audit(1617496143.878:92): pid=14117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/201/bus" dev="sda1" ino=14429 res=1 errno=0 00:29:04 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 00:29:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)={'wlan0\x00'}) [ 458.885717][T14123] fuse: Bad value for 'fd' [ 458.911759][T14123] fuse: Bad value for 'fd' 00:29:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}, 0x4}) 00:29:04 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, 0x0, 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:04 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000240)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 00:29:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:29:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, &(0x7f0000004100)) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x28}}, 0x0) 00:29:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @rand_addr=0x64010101}, {0x2, 0x0, @broadcast}, 0x4d3}) [ 459.198318][ T37] audit: type=1804 audit(1617496144.358:93): pid=14136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/202/bus" dev="sda1" ino=14429 res=1 errno=0 00:29:04 executing program 4: socketpair(0x0, 0x80000, 0x0, &(0x7f0000001000)) 00:29:04 executing program 3: renameat2(0xffffffffffffffff, &(0x7f0000001d00)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 00:29:04 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, 0x0, 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:04 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000004d40), 0x4) 00:29:04 executing program 5: clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}) 00:29:04 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[], [{@context={'context', 0x3d, 'system_u'}}, {@subj_role={'subj_role'}}]}) 00:29:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) 00:29:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x1170}, 0x0) 00:29:04 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 459.551955][ T37] audit: type=1804 audit(1617496144.727:94): pid=14154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/203/bus" dev="sda1" ino=13888 res=1 errno=0 00:29:04 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000380)=""/4096) 00:29:04 executing program 2: clock_adjtime(0x0, &(0x7f0000000000)={0x8000}) 00:29:04 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, 0x0, 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:04 executing program 1: io_setup(0x5, &(0x7f00000001c0)) socket$nl_audit(0x10, 0x3, 0x9) io_submit(0x0, 0x0, 0x0) 00:29:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x5411, &(0x7f0000000040)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}}) 00:29:05 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)={0x420}, 0x420}}, 0x0) 00:29:05 executing program 2: syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 00:29:05 executing program 4: syz_usb_connect(0x0, 0x818, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000b00)={0x0, 0x0, 0x5, &(0x7f0000000880)={0x5, 0xf, 0x5}, 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) [ 459.955235][ T37] audit: type=1804 audit(1617496145.127:95): pid=14174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/204/bus" dev="sda1" ino=14443 res=1 errno=0 00:29:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) 00:29:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x20}, 0x20}}, 0x0) 00:29:05 executing program 5: socketpair(0x10, 0x0, 0x5, &(0x7f0000000140)) 00:29:05 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:05 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) 00:29:05 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r0, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:29:05 executing program 1: io_setup(0x5, &(0x7f00000001c0)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000000)=[{}], 0x0) 00:29:05 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000200)={@dev, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d892a3", 0x0, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @loopback}}}}, 0x0) [ 460.332373][ T8531] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 460.371848][ T37] audit: type=1804 audit(1617496145.537:96): pid=14195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/205/bus" dev="sda1" ino=14430 res=1 errno=0 00:29:05 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000001040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:29:05 executing program 5: socket$inet(0x2, 0xa, 0x6680) 00:29:05 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 460.665543][ T37] audit: type=1804 audit(1617496145.837:97): pid=14210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/206/bus" dev="sda1" ino=14225 res=1 errno=0 [ 460.800757][ T8531] usb 5-1: config 3 has an invalid interface number: 255 but max is 1 [ 460.808942][ T8531] usb 5-1: config 3 contains an unexpected descriptor of type 0x2, skipping [ 460.840339][ T8531] usb 5-1: config 3 contains an unexpected descriptor of type 0x2, skipping [ 460.849055][ T8531] usb 5-1: config 3 has an invalid descriptor of length 0, skipping remainder of the config [ 460.862147][ T8531] usb 5-1: config 3 has 1 interface, different from the descriptor's value: 2 [ 460.873699][ T8531] usb 5-1: config 3 has no interface number 0 [ 460.879821][ T8531] usb 5-1: config 3 interface 255 altsetting 173 bulk endpoint 0xD has invalid maxpacket 64 [ 460.892191][ T8531] usb 5-1: config 3 interface 255 altsetting 173 has an invalid endpoint with address 0xD4, skipping [ 460.904160][ T8531] usb 5-1: config 3 interface 255 altsetting 173 endpoint 0x1 has invalid wMaxPacketSize 0 [ 460.930090][ T8531] usb 5-1: config 3 interface 255 altsetting 173 has 6 endpoint descriptors, different from the interface descriptor's value: 7 [ 460.960073][ T8531] usb 5-1: config 3 interface 255 has no altsetting 0 [ 461.210336][ T8531] usb 5-1: string descriptor 0 read error: -22 [ 461.216615][ T8531] usb 5-1: New USB device found, idVendor=0bb4, idProduct=0a0b, bcdDevice=a4.fb [ 461.242246][ T8531] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 461.282175][T14184] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 461.591782][ T9587] usb 5-1: USB disconnect, device number 9 [ 462.250256][ T8531] Bluetooth: hci0: command 0x0406 tx timeout [ 462.256320][ T8531] Bluetooth: hci3: command 0x0406 tx timeout [ 462.267683][ T8531] Bluetooth: hci4: command 0x0406 tx timeout [ 462.274449][ T8531] Bluetooth: hci5: command 0x0406 tx timeout [ 462.286986][ T8531] Bluetooth: hci1: command 0x0406 tx timeout [ 462.370039][T12035] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 462.810951][T12035] usb 5-1: config 3 has an invalid interface number: 255 but max is 1 [ 462.819159][T12035] usb 5-1: config 3 contains an unexpected descriptor of type 0x2, skipping [ 462.836110][T12035] usb 5-1: config 3 contains an unexpected descriptor of type 0x2, skipping [ 462.845662][T12035] usb 5-1: config 3 has an invalid descriptor of length 0, skipping remainder of the config [ 462.861635][T12035] usb 5-1: config 3 has 1 interface, different from the descriptor's value: 2 [ 462.874548][T12035] usb 5-1: config 3 has no interface number 0 [ 462.883016][T12035] usb 5-1: config 3 interface 255 altsetting 173 bulk endpoint 0xD has invalid maxpacket 64 00:29:08 executing program 4: clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8}) 00:29:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) 00:29:08 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000007c0)={&(0x7f0000000700), 0xfece, &(0x7f0000000780)={&(0x7f0000000740)={0x20}, 0xc0}}, 0x0) 00:29:08 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 00:29:08 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x400001, 0x0) [ 462.903067][T12035] usb 5-1: config 3 interface 255 altsetting 173 has an invalid endpoint with address 0xD4, skipping [ 462.916454][T12035] usb 5-1: config 3 interface 255 altsetting 173 endpoint 0x1 has invalid wMaxPacketSize 0 [ 462.936185][T12035] usb 5-1: config 3 interface 255 altsetting 173 has 6 endpoint descriptors, different from the interface descriptor's value: 7 [ 462.954887][T12035] usb 5-1: config 3 interface 255 has no altsetting 0 [ 463.045310][T14239] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 463.063968][T12035] usb 5-1: string descriptor 0 read error: -71 [ 463.074499][T12035] usb 5-1: New USB device found, idVendor=0bb4, idProduct=0a0b, bcdDevice=a4.fb 00:29:08 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x341, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000100)={0x0, 0x0, 0x11, &(0x7f0000000080)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc}]}}) 00:29:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x0, 0x0, {0x0}}, 0x14}}, 0x0) [ 463.127532][T12035] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 463.148465][ T37] audit: type=1804 audit(1617496148.318:98): pid=14242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/207/bus" dev="sda1" ino=14464 res=1 errno=0 00:29:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 00:29:08 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12014103000000082505a8a440000102030109021b0001010000000904000000070100000901"], &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) [ 463.240732][T12035] usb 5-1: can't set config #3, error -71 [ 463.289467][T12035] usb 5-1: USB disconnect, device number 10 00:29:08 executing program 3: request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)='/@@]$\x00', 0xffffffffffffffff) 00:29:08 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:08 executing program 2: recvmsg(0xffffffffffffffff, 0x0, 0x89d6c72bf6099a86) 00:29:08 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fallocate(r0, 0x0, 0x0, 0x5a8) 00:29:08 executing program 3: uname(&(0x7f0000000000)=""/219) [ 463.549522][ T37] audit: type=1804 audit(1617496148.724:99): pid=14267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/208/bus" dev="sda1" ino=14451 res=1 errno=0 [ 463.602868][ T9587] usb 6-1: new high-speed USB device number 7 using dummy_hcd 00:29:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x3, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @jmp, @jmp], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:29:08 executing program 2: io_setup(0x1, &(0x7f0000000040)=0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x0, 0x0) io_submit(r0, 0x3, &(0x7f0000000380)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x7fff}, 0x0, 0x0]) 00:29:08 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 463.780111][T12035] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 463.890050][ T37] audit: type=1804 audit(1617496149.064:100): pid=14281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/209/bus" dev="sda1" ino=14455 res=1 errno=0 [ 463.900082][ T9587] usb 6-1: Using ep0 maxpacket: 8 [ 464.030163][T12035] usb 5-1: Using ep0 maxpacket: 8 [ 464.141030][ T9587] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 464.190818][T12035] usb 5-1: unable to get BOS descriptor or descriptor too short [ 464.270986][T12035] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 464.321221][ T9587] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 464.336787][ T9587] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 464.356556][ T9587] usb 6-1: Product: syz [ 464.366771][ T9587] usb 6-1: Manufacturer: syz [ 464.380958][ T9587] usb 6-1: SerialNumber: syz [ 464.450181][T12035] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 464.459255][T12035] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 464.480025][T12035] usb 5-1: Product: syz [ 464.484215][T12035] usb 5-1: Manufacturer: syz [ 464.488792][T12035] usb 5-1: SerialNumber: syz [ 464.638171][ T3859] usb 6-1: USB disconnect, device number 7 [ 464.763718][ T9587] usb 5-1: USB disconnect, device number 11 [ 465.420181][ T3859] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 465.550130][T12035] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 465.660075][ T3859] usb 6-1: Using ep0 maxpacket: 8 [ 465.810054][T12035] usb 5-1: Using ep0 maxpacket: 8 [ 465.862191][ T3859] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 465.980896][T12035] usb 5-1: unable to get BOS descriptor or descriptor too short [ 466.031043][ T3859] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 466.040226][ T3859] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 466.048227][ T3859] usb 6-1: Product: syz [ 466.052882][ T3859] usb 6-1: Manufacturer: syz [ 466.057495][ T3859] usb 6-1: SerialNumber: syz [ 466.070563][T12035] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping 00:29:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) 00:29:11 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x1) 00:29:11 executing program 1: perf_event_open$cgroup(&(0x7f0000000180)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 466.260113][ T8531] usb 6-1: USB disconnect, device number 8 [ 466.270261][T12035] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 466.279905][T12035] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 466.338145][T12035] usb 5-1: Product: syz [ 466.350111][T12035] usb 5-1: Manufacturer: syz [ 466.354739][T12035] usb 5-1: SerialNumber: syz [ 466.410204][T12035] usb 5-1: can't set config #1, error -71 [ 466.425588][T12035] usb 5-1: USB disconnect, device number 12 00:29:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 00:29:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) 00:29:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f0000001500)=@sco={0x1f, @none}, 0x80, &(0x7f0000000440)=[{0x0}], 0x1, &(0x7f00000005c0)=""/41, 0x29}}, {{&(0x7f0000000800)=@sco, 0x80, &(0x7f0000000c00)=[{&(0x7f0000002b40)=""/4107, 0x100b}, {&(0x7f0000000880)=""/242, 0xf2}, {&(0x7f0000000980)=""/223, 0xdf}, {&(0x7f0000000a80)=""/190, 0xbe}, {&(0x7f0000000b40)=""/136, 0x88}], 0x5}, 0xfffffffa}, {{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f0000000740)}, 0x5}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000000d00)=""/7, 0x7}, {&(0x7f0000002a00)=""/192, 0xc0}, {&(0x7f0000000e00)=""/91, 0x5b}, {&(0x7f0000000d40)=""/118, 0x76}], 0x4, &(0x7f0000000f80)=""/4, 0x4}}, {{&(0x7f0000000fc0)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000001040)=""/158, 0x9e}, {&(0x7f0000001180)}, {&(0x7f00000011c0)=""/51, 0x33}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000002500)=""/215, 0xd7}, {&(0x7f0000002600)=""/193, 0xc1}, {&(0x7f0000002700)=""/94, 0x5e}], 0x7, &(0x7f0000001580)=""/101, 0x65}, 0x80000000}], 0x5, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f00000007c0)="30eb2297b18c0a2ada6f46f8341ce63ccdab668e820dabde", 0x41395563) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0x100000000}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r4, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendmsg$inet(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000340)="0b01d0f6e88bc3fff9abcd131fbf62e1ad6bce83527b80292b7f", 0x1a}, {&(0x7f00000004c0)="f251c3202ef9ccc31a9b984c0982ee0d561734326e7d82d68567b300b2aee22da9a1ee231a85ff3d7cbe092761def121a02a8f4e58b06797836b34a3a80b5cae41471ef25ccfce41dffbbfa1c32cbb8e4d3c4f98136b0baf009f7c352c143441bd629924f885f607b605ca5b1d6430f8ec85ebd5c32683da6b82e9514f1bf4eca6e0f7ca94e583762d1c8ff0e628f07084b198c684c04a3b2fd770465c02a0047e230fd10e8f5140178e4a42edf9821eeb7a45cd9051412c19f909e90fe75a8b216a992c9ecc3ef0975e93200bcf955225a37356a593a8ba8e7016366fc649f3b96e70f625a773ea69f6a0c3", 0xec}], 0x2}, 0x90) 00:29:11 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000001880)={0xa, 0x4e24, 0x0, @loopback, 0x400}, 0x1c, &(0x7f0000001a80)=[{&(0x7f00000018c0)="b3", 0x1}, {&(0x7f00000019c0)='7', 0x1}], 0x2, &(0x7f0000001ac0)=[@hopopts_2292={{0x18}}], 0x18}}, {{&(0x7f0000001c00)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000002040)=[@flowinfo={{0x14, 0x29, 0xb, 0x7}}, @flowinfo={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x58}}], 0x2, 0x0) 00:29:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 466.615353][ T37] audit: type=1804 audit(1617496151.794:101): pid=14347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/210/bus" dev="sda1" ino=14468 res=1 errno=0 00:29:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x8943, &(0x7f0000000080)={@bcast, @bcast}) 00:29:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00000036c0), &(0x7f0000003700)=0x4) 00:29:11 executing program 4: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 00:29:12 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f00000000c0)) 00:29:12 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 00:29:12 executing program 4: munmap(&(0x7f00007fe000/0x800000)=nil, 0x800000) 00:29:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='blacklist\x00', 0x0, 0x0, 0x0, r0) [ 467.077605][ T37] audit: type=1804 audit(1617496152.254:102): pid=14370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/211/bus" dev="sda1" ino=14450 res=1 errno=0 00:29:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xb, 0x11, r0, 0x0) 00:29:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') 00:29:12 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_PMSR_ATTR_PEERS={0x518, 0x5, 0x0, 0x1, [{0x2e4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x2bc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xdc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x4}, {0x22c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x228, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x128, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x70, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x98c, 0x5, 0x0, 0x1, [{0x22c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1d0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x94, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x75c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xc8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x5e8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xfc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x15c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x15c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}]}]}]}]}, 0xec4}}, 0x0) 00:29:12 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 00:29:12 executing program 1: connect(0xffffffffffffffff, &(0x7f0000000000)=@tipc, 0x80) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) 00:29:12 executing program 3: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$getsig(0x4202, r0, 0x5ad, &(0x7f0000000040)) [ 467.572796][ T37] audit: type=1804 audit(1617496152.744:103): pid=14387 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/212/bus" dev="sda1" ino=14484 res=1 errno=0 00:29:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001200)=r1, 0x4) 00:29:12 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 00:29:12 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000b40)='NET_DM\x00', 0xffffffffffffffff) 00:29:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x2, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 00:29:13 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:13 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x20000) 00:29:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 00:29:13 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40030, 0xffffffffffffffff, 0x0) 00:29:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x20008c01) 00:29:13 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 468.076846][ T37] audit: type=1804 audit(1617496153.244:104): pid=14414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/213/bus" dev="sda1" ino=14457 res=1 errno=0 00:29:13 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:29:13 executing program 4: rt_sigaction(0x3f, 0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000900)) 00:29:13 executing program 3: memfd_create(&(0x7f00000000c0)=')\x00', 0x0) 00:29:13 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:13 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:29:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 468.356533][ T37] audit: type=1804 audit(1617496153.534:105): pid=14428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/214/bus" dev="sda1" ino=14480 res=1 errno=0 00:29:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x44, 0x3, 0x1, 0x3, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x28, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @remote}}}]}]}, 0x44}}, 0x0) 00:29:13 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006280)={0x0}}, 0x0) 00:29:13 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:13 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x18}, 0x10) 00:29:13 executing program 5: r0 = socket(0x1, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:29:13 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x20}}, 0x0) 00:29:13 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x4000012, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009032, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newrule={0x38, 0x20, 0x720578534169476f, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_IFGROUP={0x8}, @FRA_FLOW={0x8, 0xb, 0x9ea2}, @FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0xffffffffffffff80}]}, 0x38}}, 0x0) 00:29:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 468.796141][ T37] audit: type=1804 audit(1617496153.974:106): pid=14449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/215/bus" dev="sda1" ino=14492 res=1 errno=0 00:29:14 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) 00:29:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'macvlan0\x00', @ifru_ivalue}}) 00:29:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1ef) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x1a, r1, 0x8, &(0x7f0000000100)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1}, 0x10, 0xffffffffffffffff}, 0x74) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x40000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) getsockname$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f0000000240)=0x10) 00:29:14 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:14 executing program 2: socket(0x3d, 0x0, 0x0) 00:29:14 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:29:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2286, 0x816d000) 00:29:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000440)={'syztnl2\x00', 0x0}) 00:29:14 executing program 3: r0 = openat$zero(0xffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, 0x0) [ 469.279665][ T37] audit: type=1804 audit(1617496154.454:107): pid=14468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/216/bus" dev="sda1" ino=14448 res=1 errno=0 [ 469.370418][T14480] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 00:29:14 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2286, 0x816d000) fcntl$setlease(r0, 0x400, 0x0) 00:29:14 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x4000012, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009032, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newrule={0x28, 0x20, 0x720578534169476f, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc}]}, 0x28}}, 0x0) 00:29:14 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, 0x0) [ 469.645995][ T37] audit: type=1804 audit(1617496154.824:108): pid=14491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/217/bus" dev="sda1" ino=14493 res=1 errno=0 00:29:14 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x4000, 0x0) 00:29:14 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:15 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0}) select(0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240)={r0}) 00:29:15 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000bc0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) [ 469.939144][ T37] audit: type=1804 audit(1617496155.114:109): pid=14501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/218/bus" dev="sda1" ino=14472 res=1 errno=0 00:29:15 executing program 1: msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4) 00:29:15 executing program 5: semctl$GETALL(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=""/82) semctl$GETALL(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)=""/84) 00:29:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') 00:29:15 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 00:29:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002740)={0x0, 0x0, 0x0}, 0x1) 00:29:15 executing program 3: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)) 00:29:15 executing program 1: setitimer(0x2, &(0x7f0000000180), 0x0) 00:29:15 executing program 4: open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file1\x00') truncate(&(0x7f00000001c0)='./file1\x00', 0x0) [ 470.488663][ T37] audit: type=1804 audit(1617496155.654:110): pid=14519 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/219/bus" dev="sda1" ino=14506 res=1 errno=0 00:29:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) 00:29:16 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) creat(&(0x7f0000007a00)='./file0\x00', 0x84) creat(&(0x7f0000007b80)='./file0\x00', 0x0) listxattr(&(0x7f0000007e00)='./file0\x00', 0x0, 0x0) 00:29:16 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:16 executing program 4: openat$apparmor_task_current(0xffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) 00:29:16 executing program 3: timer_create(0x0, &(0x7f0000002680)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 00:29:16 executing program 5: timer_create(0x7, &(0x7f0000002200)={0x0, 0x38}, &(0x7f0000002240)) 00:29:16 executing program 1: timer_create(0x3, 0x0, &(0x7f00000026c0)) [ 471.038883][ T37] audit: type=1804 audit(1617496156.214:111): pid=14539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/220/bus" dev="sda1" ino=14513 res=1 errno=0 00:29:16 executing program 5: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 00:29:16 executing program 1: open$dir(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002600)={0x0}}, 0x0) 00:29:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000009580)={'syztnl2\x00', 0x0}) 00:29:16 executing program 2: timer_create(0x0, 0x0, &(0x7f0000002080)) timer_gettime(0x0, &(0x7f0000000280)) 00:29:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) 00:29:16 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:16 executing program 5: r0 = creat(&(0x7f0000001c40)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 00:29:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x0, 0x8, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:29:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000002780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:29:16 executing program 4: socketpair(0x3, 0x0, 0x400, &(0x7f0000000700)) [ 471.452386][ T37] audit: type=1804 audit(1617496156.634:112): pid=14561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/221/bus" dev="sda1" ino=14449 res=1 errno=0 00:29:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001a00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002380)={0x0, 0x0, 0x0}, 0x0) 00:29:16 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x1052c4, 0x0) 00:29:16 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886b"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) 00:29:16 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0xec4, 0x15, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x65, 0x1, "2e5de4546dda1eabda0be5f13f8787d59a914ab0ecd0fac277604a66a88af001265229e8eeb7e7075717865d36910ef6a7f167d94e566d5277751c4b1f4ff4ec3f8441eccc8fe05592a55664e96ad1b7eb617816e04e4ba72dc0e0194b2ec4f3ad"}, @INET_DIAG_REQ_BYTECODE={0xf5, 0x1, "724250b05c45d9059d4df27a0e38ba6d9b9ab584e61928202a9ebef88be429f7253c3f5268479143142df4de902e73c77284ed7f8947d01c1bf7f05e127c52a0f7a1cc34c3b42f6a9d5fb240019f3bae82015f9ff780c2823488c85d662ea6db4212d922a5f5c037490c485006f1114506abd0891d762bc0bbd539c903facc2a1e336109481746c795bf002d759bfbb6186e0a44cba484461a14fe6edfdaa765dadee4bb8160bdf68a2d53b93a1c95bce2ef479667cb41bb1d9b794b96becdd56087b3633ad350f7acf9ae53c17c37d6616ff4e91fe74d532478baf3d351aca781d66d286d6c43fa19b07193e0950a9aac"}, @INET_DIAG_REQ_BYTECODE={0xc1, 0x1, "52855f1d399c4490ad7fe1ad623a9f78d108aaf77d31b98233201b80b8a3b442b2d7b9ecda2cb637989635c659cb715cc1ffcc78b69368b27232ae1cc5f7bcd5258d324bf11d6b8296bc708d4824634dbe56076aa4f37a15a17cf831aec3b0b03e344fb5931deddd1e48928e529e561c07351f2df19440af47e109e970ed270488d621f7a061ed9d9be3bc833461654007f6fabc43cb24cc94c31e2181d51ee565e29e3774e9687bc324cf006bf7cee5c0d17789aad795bf9d1592ac88"}, @INET_DIAG_REQ_BYTECODE={0x4e, 0x1, "e38e7c45b3249f11506b71818db0d41a2335282ce3d03c62217c0215e4fdb25401c7af08009b583b1aa8e05b180f5e7511a1a3f1a537c06156a536cf7157fe05df6dff40e5a691064e1e"}, @INET_DIAG_REQ_BYTECODE={0xc39, 0x1, "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"}]}, 0xec4}}, 0x0) 00:29:16 executing program 4: r0 = io_uring_setup(0x58a5, &(0x7f0000000080)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r1) 00:29:16 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x8001) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x38) 00:29:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000007f80)={0x0, 0x0, &(0x7f0000007f40)={&(0x7f0000000340)={{0x28, 0x10, 0x1, 0x0, 0x0, {0x2}}, [], {0x14}}, 0x28}}, 0x0) [ 471.856577][ T37] audit: type=1804 audit(1617496157.034:113): pid=14577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/222/bus" dev="sda1" ino=14501 res=1 errno=0 00:29:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000001940), 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB='errors=continue,uid=']) 00:29:17 executing program 4: r0 = io_uring_setup(0x58a5, &(0x7f0000000080)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r1) 00:29:17 executing program 2: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000140)=0x3) 00:29:17 executing program 3: ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil}) socketpair(0x2b, 0x0, 0x0, &(0x7f0000000580)) 00:29:17 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 472.111709][T14592] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:29:17 executing program 4: r0 = io_uring_setup(0x58a5, &(0x7f0000000080)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r1) [ 472.166549][T14593] ntfs: (device loop1): parse_options(): The uid option requires an argument. 00:29:17 executing program 3: waitid(0x1, 0x0, &(0x7f0000001440), 0x100000a, 0x0) [ 472.251980][T14593] ntfs: (device loop1): parse_options(): The uid option requires an argument. 00:29:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:17 executing program 1: socketpair(0x2b, 0x0, 0x0, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) syz_io_uring_setup(0x3dfc, &(0x7f0000000380)={0x0, 0x700e}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3dfc, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x2d6}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 00:29:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, 0x0) 00:29:17 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'dummy0\x00', @ifru_names}) 00:29:17 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:17 executing program 4: r0 = io_uring_setup(0x58a5, &(0x7f0000000080)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r1) 00:29:17 executing program 1: clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x58) 00:29:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:17 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 00:29:17 executing program 3: syz_usb_connect$uac1(0x2, 0x71, &(0x7f00000001c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000640)={0xa, &(0x7f00000002c0)={0xa}, 0x0, 0x0}) 00:29:18 executing program 4: openat$cgroup_root(0xffffff9c, &(0x7f00000005c0)='./cgroup/syz1\x00', 0x200002, 0x0) 00:29:18 executing program 2: openat$ubi_ctrl(0xffffff9c, &(0x7f0000000480)='/dev/ubi_ctrl\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffff9c, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000440)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 00:29:18 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:18 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f00000004c0)=ANY=[@ANYBLOB="1201090097001d084c05c10666d508000001090224000100000000090400000209afbade09058e02"], 0x0) 00:29:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)) lstat(&(0x7f00000087c0)='./file0\x00', &(0x7f0000008800)) 00:29:18 executing program 2: shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) mincore(&(0x7f0000ff8000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/38) 00:29:18 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 473.250291][ T3859] usb 4-1: new full-speed USB device number 12 using dummy_hcd 00:29:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 00:29:18 executing program 2: mq_open(&(0x7f00000001c0)='.)\\]\'\x00', 0x0, 0x0, 0x0) [ 473.480245][ T9077] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 473.660245][ T3859] usb 4-1: unable to get BOS descriptor or descriptor too short [ 473.720380][ T3859] usb 4-1: not running at top speed; connect to a high speed hub [ 473.730225][ T9077] usb 5-1: Using ep0 maxpacket: 8 [ 473.820261][ T3859] usb 4-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 473.830356][ T3859] usb 4-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 473.842997][ T3859] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 473.865751][ T9077] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 473.890399][ T9077] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x8E has invalid wMaxPacketSize 0 [ 473.901867][ T9077] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8E has invalid maxpacket 0 [ 473.912652][ T9077] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 474.017770][ T3859] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 474.030313][ T9077] usb 5-1: New USB device found, idVendor=054c, idProduct=06c1, bcdDevice=d5.66 [ 474.034397][ T3859] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 474.039393][ T9077] usb 5-1: New USB device strings: Mfr=8, Product=0, SerialNumber=0 [ 474.039424][ T9077] usb 5-1: Manufacturer: syz [ 474.051609][ T9077] usb 5-1: config 0 descriptor?? [ 474.065418][ T3859] usb 4-1: Product: syz [ 474.073567][ T3859] usb 4-1: Manufacturer: syz [ 474.078310][ T3859] usb 4-1: SerialNumber: syz [ 474.360669][ T9077] hub 5-1:0.0: bad descriptor, ignoring hub [ 474.366675][ T9077] hub: probe of 5-1:0.0 failed with error -5 [ 474.380917][ T9077] port100 5-1:0.0: NFC: Could not find bulk-in or bulk-out endpoint [ 474.410297][ T3859] usb 4-1: 0:2 : does not exist [ 474.432526][ T3859] usb 4-1: USB disconnect, device number 12 [ 474.450714][ T9077] usb 5-1: USB disconnect, device number 13 [ 475.140884][T12035] usb 4-1: new full-speed USB device number 13 using dummy_hcd [ 475.148598][ T9077] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 475.430616][ T9077] usb 5-1: Using ep0 maxpacket: 8 [ 475.571581][ T9077] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 475.583252][ T9077] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x8E has invalid wMaxPacketSize 0 [ 475.593362][T12035] usb 4-1: unable to get BOS descriptor or descriptor too short [ 475.602352][ T9077] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8E has invalid maxpacket 0 [ 475.616447][ T9077] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 475.651062][T12035] usb 4-1: not running at top speed; connect to a high speed hub [ 475.720374][ T9077] usb 5-1: New USB device found, idVendor=054c, idProduct=06c1, bcdDevice=d5.66 [ 475.729509][ T9077] usb 5-1: New USB device strings: Mfr=8, Product=0, SerialNumber=0 [ 475.743791][ T9077] usb 5-1: Manufacturer: syz [ 475.750416][T12035] usb 4-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 475.759138][T12035] usb 4-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 475.784678][ T9077] usb 5-1: config 0 descriptor?? [ 475.795795][T12035] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 00:29:21 executing program 3: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/clear_refs\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000000c0)='0\x00', 0x2) 00:29:21 executing program 1: r0 = socket(0x2, 0xa, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) 00:29:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) 00:29:21 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 476.028784][ T37] kauditd_printk_skb: 4 callbacks suppressed [ 476.028825][ T37] audit: type=1804 audit(1617496161.204:118): pid=14725 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/227/bus" dev="sda1" ino=14537 res=1 errno=0 00:29:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000140)) [ 476.070392][T12035] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 476.079485][T12035] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 476.100677][ T9077] hub 5-1:0.0: bad descriptor, ignoring hub [ 476.106707][ T9077] hub: probe of 5-1:0.0 failed with error -5 [ 476.131057][ T9077] port100 5-1:0.0: NFC: Could not find bulk-in or bulk-out endpoint [ 476.170771][T12035] usb 4-1: can't set config #1, error -71 00:29:21 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40000040) 00:29:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001700)={&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="140000000000000000000000070000000001000000000000bc000000000000000000000007000000c208a00b3b47c81b4444"], 0x148}, 0x0) 00:29:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000001680), 0x0, &(0x7f0000001700)={0x8}, 0x0, 0x0) [ 476.197149][T12035] usb 4-1: USB disconnect, device number 13 [ 476.239932][ T9077] usb 5-1: USB disconnect, device number 14 00:29:21 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:21 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f00000000c0)=@t={0x81, 0x8}) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 00:29:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 00:29:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) 00:29:21 executing program 4: futex(&(0x7f00000000c0), 0x8b, 0x0, 0x0, 0x0, 0x0) [ 476.509132][ T37] audit: type=1804 audit(1617496161.684:119): pid=14754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/228/bus" dev="sda1" ino=14529 res=1 errno=0 00:29:21 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b6807"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:21 executing program 2: r0 = socket(0x1, 0x2, 0x0) sendmsg$rds(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@zcopy_cookie={0x18}], 0x18}, 0x0) 00:29:21 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$rds(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/31, 0x1f}], 0x1, &(0x7f0000001bc0)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x48}, 0x0) 00:29:21 executing program 1: syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) [ 476.787771][ T37] audit: type=1804 audit(1617496161.964:120): pid=14772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/229/bus" dev="sda1" ino=13907 res=1 errno=0 00:29:22 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) read$dsp(r0, 0x0, 0x0) 00:29:22 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 477.034011][ T37] audit: type=1804 audit(1617496162.214:121): pid=14781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/230/bus" dev="sda1" ino=14543 res=1 errno=0 00:29:22 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@mask_cswp={0x58, 0x114, 0x9, {{}, 0x0, 0x0}}], 0x58}, 0x4000040) 00:29:22 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x68902, 0x0) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='9p\x00', 0x0, &(0x7f0000000880)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 00:29:22 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x142, 0x0, 0x0) 00:29:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 00:29:24 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, 0x0, 0x0) 00:29:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, 0x0, &(0x7f0000001ec0)) 00:29:24 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @default]}) 00:29:24 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x68902, 0x0) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='9p\x00', 0x0, &(0x7f0000000880)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 00:29:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f0000001680), 0x0, &(0x7f0000001700)={0x8}, 0x0, 0x0) 00:29:24 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, 0x0, &(0x7f00000001c0)) [ 479.637826][ T37] audit: type=1804 audit(1617496164.814:122): pid=14815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/231/bus" dev="sda1" ino=14548 res=1 errno=0 00:29:24 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:24 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@t={0x81, 0x5}) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 00:29:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$char_raw(r0, 0x0, 0x0) [ 479.828451][ T37] audit: type=1804 audit(1617496165.004:123): pid=14824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/232/bus" dev="sda1" ino=14560 res=1 errno=0 00:29:25 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 480.107175][ T37] audit: type=1804 audit(1617496165.284:124): pid=14833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/233/bus" dev="sda1" ino=14559 res=1 errno=0 00:29:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:27 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00', r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) 00:29:27 executing program 3: timer_create(0x7, &(0x7f00000000c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000000180)) 00:29:27 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:27 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x68902, 0x0) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='9p\x00', 0x0, &(0x7f0000000880)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 00:29:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0)='802.15.4 MAC\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x0) [ 482.756873][ T37] audit: type=1804 audit(1617496167.934:125): pid=14850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/234/bus" dev="sda1" ino=14115 res=1 errno=0 00:29:28 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x3938700}}, &(0x7f0000000080)) 00:29:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)=""/157, 0x9d}}], 0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x107, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) 00:29:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000001280)={0x40, 0x1, 0x9, 0x401, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x20, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}]}]}, 0x40}}, 0x0) 00:29:28 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 482.940554][T14864] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 00:29:28 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) 00:29:28 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000240)=@hat={'permhat ', 0x0, 0x5e, ['\x00{\x92\x06\x03\xb1(\xf1\xc8A\x136\"\xab\xe9\xce\xc3\xf9`\xb1\'mLO_*\xfd$\xe4\x9fwA\xdf%\xf3h\xac\xbb\xbb\x8c\xd6\xfd\xfc\xb0\xd0\xb9\xf9r\xe9\x8aAD\xf3\x15\xb5\x86)\xcd\x9f\xdb\x02\x83\xe6&\xb5X\x14\x8f/\xbe\xdc\xe3\xd2\xbd0q5\x98\xcd\xf5\xa8\xf2F^\xce\xbb+\xcbN\xf2~', '/proc/thread-self/attr/current\x00', '(*\x00\xe5E[u\x8d\xbf*\xaf\xf0\xdbnG\xdeF\xc2\xe5d\xad9\vA\x8e\xd1\x9a\xebTb(lz\x84\xd1\xa0\xc9\x01?\xfc\x1f\xad\f\x98L\x10\x1f\xe7\x8a\xac\xdf\xf3W\xf5s(N\x00\x814\xeb\xe6,+D,\x1e\xb4\"\xc2\x0e/$\x0e\xf9_\xdc\x84\xde\xd0\xfcmW\xb0:\xf0 \xd7\xa2\x87\x98\xa0\x8fQ\xf0\x8e\xf1\xed\xcd`\xeez\x92\xa1']}, 0xfd) 00:29:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) [ 483.085044][ T37] audit: type=1804 audit(1617496168.264:126): pid=14869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/235/bus" dev="sda1" ino=14145 res=1 errno=0 00:29:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:28 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 483.211510][T14877] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 483.358182][ T37] audit: type=1804 audit(1617496168.524:127): pid=14885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/236/bus" dev="sda1" ino=14001 res=1 errno=0 00:29:28 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x68902, 0x0) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='9p\x00', 0x0, &(0x7f0000000880)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 00:29:28 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000240)=@hat={'permhat ', 0x0, 0x5e, ['\x00{\x92\x06\x03\xb1(\xf1\xc8A\x136\"\xab\xe9\xce\xc3\xf9`\xb1\'mLO_*\xfd$\xe4\x9fwA\xdf%\xf3h\xac\xbb\xbb\x8c\xd6\xfd\xfc\xb0\xd0\xb9\xf9r\xe9\x8aAD\xf3\x15\xb5\x86)\xcd\x9f\xdb\x02\x83\xe6&\xb5X\x14\x8f/\xbe\xdc\xe3\xd2\xbd0q5\x98\xcd\xf5\xa8\xf2F^\xce\xbb+\xcbN\xf2~', '/pr\aL\f;Pk\xf2\x1a\x91Joc/thread-s lf/att', '&!W\xd7@\x00', '/proc/thread-self/attr/current\x00', '(*\x00\xe5E[u\x8d\xbf*\xaf\xf0\xdbnG\xdeF\xc2\xe5d\xad9\vA\x8e\xd1\x9a\xebTb(lz\x84\xd1\xa0\xc9\x01?\xfc\x1f\xad\f\x98L\x10\x1f\xe7\x8a\xac\xdf\xf3W\xf5s(N\x00\x814\xeb\xe6,+D,\x1e\xb4\"\xc2\x0e/$\x0e\xf9_\xdc\x84\xde\xd0\xfcmW\xb0:\xf0 \xd7\xa2\x87\x98\xa0\x8fQ\xf0\x8e\xf1\xed\xcd`\xeez\x92\xa1']}, 0x122) 00:29:28 executing program 3: r0 = socket(0x1, 0x2, 0x0) getsockopt$rose(r0, 0x104, 0x0, 0x0, 0x0) 00:29:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(r0, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004080)=[{0x0}, {0x0}], 0x2, &(0x7f00000041c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @remote}}}, @ip_tos_int={{0x14}}], 0x38}, 0x801) 00:29:28 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000006c0)) 00:29:28 executing program 2: r0 = syz_open_dev$binderN(&(0x7f00000003c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 00:29:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 483.651675][T14900] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 483.702120][ T37] audit: type=1804 audit(1617496168.874:128): pid=14899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/237/bus" dev="sda1" ino=14130 res=1 errno=0 00:29:28 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x1ff}, 0x0, 0x0, &(0x7f0000000180)={0x0}) 00:29:29 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:29 executing program 2: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3ff, 0x200000) 00:29:29 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xc, 0x0, &(0x7f00000001c0)) 00:29:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) bind$pptp(r0, 0x0, 0x0) 00:29:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:29 executing program 1: r0 = socket(0x1, 0x2, 0x0) bind$rose(r0, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x0, [@bcast, @default, @default, @bcast, @default, @default]}, 0x40) 00:29:29 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) read(r0, &(0x7f0000000000)=""/54, 0xff55) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fec000/0x13000)=nil, 0x1000}) 00:29:29 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 484.681584][T14933] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability 00:29:29 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@t={0x81, 0x8}) 00:29:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:30 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000001500)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) 00:29:30 executing program 4: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) 00:29:30 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000066c0)={'ip6gre0\x00', &(0x7f0000006640)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @private2}}) 00:29:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:29:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:30 executing program 2: r0 = socket(0x2, 0x1, 0x0) recvfrom$rose(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:29:30 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f00000000c0)=@s={0x5, @SEQ_MIDIPUTC, 0x16}) 00:29:30 executing program 1: socket(0x3, 0x0, 0x7fffffff) 00:29:30 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa) 00:29:30 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:30 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x0, 0x0, "9682859164511a27e9d007c93af3c3084b2a7237a2660aea840d09e505d665c72925cb65ac69a763bfe6ffaf629c51483f6209e94b0cb052a61c8c7067a8b52f97aa1e9055fc885c8e31ee1c07e0bc32"}, 0xd8) 00:29:30 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x15, 0x0, &(0x7f0000000000)) 00:29:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendto$rose(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:29:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) [ 485.460600][ T37] audit: type=1804 audit(1617496170.644:129): pid=14974 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/241/bus" dev="sda1" ino=14565 res=1 errno=0 00:29:30 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x670, 0xf0, 0x230, 0xffffffff, 0xf0, 0x480, 0x5a0, 0x5a0, 0xffffffff, 0x5a0, 0x5a0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv6=@mcast1, @ipv6=@mcast1, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@local}}}, {{@uncond, 0x0, 0x228, 0x250, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}, @common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @mcast1, @rand_addr=' \x01\x00', @loopback, @empty, @ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @private0, @private2, @mcast2, @private2, @ipv4={[], [], @empty}, @empty, @private2]}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@ipv6={@empty, @private1, [], [], 'wg1\x00', 'wlan0\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@ipv4={[], [], @multicast2}, @icmp_id, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) 00:29:30 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x1}, 0x4) 00:29:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 00:29:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0xfffffda3}}, 0x0) 00:29:30 executing program 2: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0xa80) [ 485.739180][T14999] x_tables: duplicate underflow at hook 1 [ 485.801553][ T37] audit: type=1804 audit(1617496170.974:130): pid=14996 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/242/bus" dev="sda1" ino=14576 res=1 errno=0 00:29:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(r0, &(0x7f0000004300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000041c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @remote}}}], 0x20}, 0x801) 00:29:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{}, "1aa9fbd982f03db6", "c28122400df2151351626073ba027f3f29960cc39b73b3c9424e53255cb6e7de", "b549cbaa", "6ab88bd29bc8c47c"}, 0x38) 00:29:31 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040), 0x4) 00:29:31 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000000)=@t={0x81, 0x6}) 00:29:31 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 00:29:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:31 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@profile={'permprofile ', '\xee\x96\x00'}, 0xf) [ 486.247312][ T37] audit: type=1804 audit(1617496171.424:131): pid=15031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/243/bus" dev="sda1" ino=14562 res=1 errno=0 00:29:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff36, 0x0, 0x29}, 0x0) 00:29:31 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:29:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:31 executing program 4: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 00:29:31 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x0, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 486.427638][ T37] audit: type=1400 audit(1617496171.594:132): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=EE96 pid=15035 comm="syz-executor.1" 00:29:31 executing program 1: socket(0x65, 0x0, 0x0) 00:29:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_ASSOCIATE_RESP(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 486.635390][ T37] audit: type=1804 audit(1617496171.814:133): pid=15048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/244/bus" dev="sda1" ino=14577 res=1 errno=0 00:29:31 executing program 2: r0 = socket(0x1e, 0x2, 0x0) sendto$rose(r0, 0x0, 0xffffffffffffff83, 0x0, 0x0, 0x0) 00:29:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:31 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 00:29:32 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, &(0x7f0000000100)) 00:29:32 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x0, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:32 executing program 3: r0 = socket(0x1, 0x2, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:29:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:32 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@n={0x1, 0x0, @generic}) 00:29:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) 00:29:32 executing program 1: socket(0x3, 0x0, 0xc35) [ 487.020714][ T37] audit: type=1804 audit(1617496172.194:134): pid=15071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/245/bus" dev="sda1" ino=14582 res=1 errno=0 00:29:32 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendto$rose(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:29:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:32 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x0, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:32 executing program 2: r0 = socket(0x1e, 0x2, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x0) 00:29:32 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000980)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x168, 0x168, 0x0, 0xffffffff, 0xffffffff, 0x218, 0x218, 0x218, 0xffffffff, 0x4, 0x0, {[{{@ip={@broadcast, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'veth0_to_bond\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7fff, 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "115a9ef3546b435267e35ec6c524ae09ed553494d9c0ef0851e4ab2ddb80"}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "a701c3ecba0092cd6d863f4bc5b98a1b0eb319355d7098b3950ea99972b5"}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 00:29:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r1, 0x1}, 0x28}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:29:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @mcast2}}) 00:29:32 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 00:29:32 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000007a00)={0x77359400}) 00:29:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:32 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) [ 487.513413][T15101] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 487.582726][T15101] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 00:29:32 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:29:32 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x4, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4392ef2c"}}) 00:29:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:32 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) 00:29:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @remote, 0x0, 0x0, 'macsec0\x00', 'veth0_to_team\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@unspec=@cpu={{0x28, 'cpu\x00'}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff}}}}, {{@ip={@remote, @local, 0x0, 0x0, 'team0\x00', 'bridge_slave_1\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) [ 487.769353][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 487.769370][ T37] audit: type=1804 audit(1617496172.944:136): pid=15116 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/247/bus" dev="sda1" ino=14562 res=1 errno=0 00:29:33 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:29:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000008940)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) 00:29:33 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x7000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 487.942288][T15128] x_tables: duplicate underflow at hook 2 00:29:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 00:29:33 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x4, 0x10, r0, 0x0) 00:29:33 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000001680), &(0x7f00000016c0)={0x5}, &(0x7f0000001700)={0x8}, 0x0, 0x0) 00:29:33 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x30) [ 488.171831][ T37] audit: type=1804 audit(1617496173.344:137): pid=15138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/248/bus" dev="sda1" ino=14594 res=1 errno=0 00:29:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0)='802.15.4 MAC\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x0) 00:29:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[], 0x68}}, 0x0) 00:29:33 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 00:29:33 executing program 4: socket(0x2, 0xa, 0x0) socketpair(0x11, 0x3, 0x0, &(0x7f0000000040)) 00:29:33 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x0, 0x0) 00:29:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:33 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={0x0}}, 0x0) 00:29:33 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000004f40)={0x0, 0x0, &(0x7f0000004f00)={0x0}}, 0x0) 00:29:33 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x81000) [ 488.611797][ T37] audit: type=1804 audit(1617496173.784:138): pid=15158 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/249/bus" dev="sda1" ino=14586 res=1 errno=0 00:29:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:33 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x1279) 00:29:33 executing program 2: keyctl$restrict_keyring(0xa, 0x0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)='\x00') 00:29:33 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(0x0, 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:34 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x4800, 0x0) 00:29:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:34 executing program 4: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, r0+60000000}, 0x0) 00:29:34 executing program 1: syz_mount_image$squashfs(&(0x7f0000000180)='squashfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000001980)) r0 = inotify_init() inotify_rm_watch(0xffffffffffffffff, 0x0) inotify_add_watch(r0, &(0x7f0000001380)='./file0\x00', 0x20000500) [ 489.008892][ T37] audit: type=1804 audit(1617496174.184:139): pid=15182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/250/bus" dev="sda1" ino=14603 res=1 errno=0 00:29:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 00:29:34 executing program 2: syz_mount_image$tmpfs(&(0x7f00000029c0)='tmpfs\x00', &(0x7f0000002a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003dc0)={[{@size={'size', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot'}}]}) 00:29:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x8341210e5c8dd6bd) 00:29:34 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(0x0, 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:34 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x127b) [ 489.214519][T15193] Can't find a SQUASHFS superblock on loop1 [ 489.251665][T15196] tmpfs: Bad value for 'size' [ 489.275216][T15193] Can't find a SQUASHFS superblock on loop1 [ 489.299731][ T37] audit: type=1804 audit(1617496174.474:140): pid=15203 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/251/bus" dev="sda1" ino=14605 res=1 errno=0 [ 489.304316][T15196] tmpfs: Bad value for 'size' 00:29:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 00:29:34 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@fsuuid={'fsuuid'}}]}) 00:29:34 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20140, 0x0) 00:29:34 executing program 3: syz_mount_image$tmpfs(&(0x7f0000006f40)='tmpfs\x00', &(0x7f0000006f80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000008200)={[{@mode={'mode'}}], [{@smackfsdef={'smackfsdef', 0x3d, '%@'}}]}) 00:29:34 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(0x0, 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 489.555408][T15212] tmpfs: Unknown parameter 'fsuuid' [ 489.577014][T15212] tmpfs: Unknown parameter 'fsuuid' [ 489.666679][T15219] tmpfs: Unknown parameter 'smackfsdef' [ 489.682653][T15219] tmpfs: Unknown parameter 'smackfsdef' [ 489.739205][ T37] audit: type=1804 audit(1617496174.914:141): pid=15220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/252/bus" dev="sda1" ino=14564 res=1 errno=0 00:29:35 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f00000002c0)={0x0, "cf1cdf15cf6e489cfe47caabcaefc1ce9f9ac1cb174074230743620bb41eb8572bcff94cae3a36aa1cc71971cdb6e2fbb2a058119357f1c88617930a77e50c5c"}, 0x48, r0) 00:29:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 00:29:35 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='comm\x00') 00:29:35 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x1261) 00:29:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00', r0) 00:29:35 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x0, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 490.074794][ T37] audit: type=1804 audit(1617496175.254:142): pid=15232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/253/bus" dev="sda1" ino=14619 res=1 errno=0 00:29:35 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xc000) 00:29:35 executing program 2: perf_event_open$cgroup(&(0x7f0000002940)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:29:35 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000002a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003dc0)={[{@size={'size', 0x3d, [0x0]}}], [{@uid_lt={'uid<', 0xee01}}]}) 00:29:35 executing program 4: add_key(&(0x7f00000000c0)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='}+$\x00', 0x0) [ 490.222684][ T37] audit: type=1804 audit(1617496175.254:143): pid=15232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/253/bus" dev="sda1" ino=14619 res=1 errno=0 00:29:35 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x0, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:35 executing program 3: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@mpol={'mpol', 0x3d, {'prefer', '=static'}}}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 00:29:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:35 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f00000046c0)='/dev/hwrng\x00', 0x101002, 0x0) 00:29:35 executing program 4: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="aefcebb07a9727", 0x7, 0x6}], 0x0, 0x0) 00:29:35 executing program 1: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000400)={0x0, "8b1473e48b8d692ea547b20919a30d63f0e0a0a896478fd7573af671584b95d69500b957b2fd66036b073d94215c7742402d05fac0ae9b8f5d3a0c641f1076fa"}, 0x48, 0xfffffffffffffffe) 00:29:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 490.525627][T15253] loop3: detected capacity change from 0 to 64 [ 490.528205][ T37] audit: type=1804 audit(1617496175.704:144): pid=15251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/254/bus" dev="sda1" ino=14617 res=1 errno=0 [ 490.617563][T15253] tmpfs: Bad value for 'mpol' 00:29:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x4, r1, 0x0, 0x0) 00:29:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 490.712085][ T37] audit: type=1804 audit(1617496175.754:145): pid=15251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/254/bus" dev="sda1" ino=14617 res=1 errno=0 00:29:35 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x0, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:36 executing program 4: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000000c0)='0\x00', 0x200000c2) 00:29:36 executing program 2: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) [ 490.799684][T15253] loop3: detected capacity change from 0 to 64 [ 490.812485][T15253] tmpfs: Bad value for 'mpol' 00:29:36 executing program 2: keyctl$restrict_keyring(0x2, 0x0, 0x0, &(0x7f0000000100)='syz') 00:29:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 490.957772][T15287] ptrace attach of "/root/syz-executor.5"[15286] was attempted by "/root/syz-executor.5"[15287] 00:29:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:36 executing program 1: keyctl$restrict_keyring(0x14, 0x0, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)='syz') 00:29:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8915, &(0x7f0000000740)={0x0, @in={0x2, 0x0, @private}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @nl=@unspec}) 00:29:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:36 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000c40)) [ 491.200258][T15301] ptrace attach of "/root/syz-executor.5"[15298] was attempted by "/root/syz-executor.5"[15301] 00:29:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x100000001}], 0x2000008, &(0x7f0000000280)={[], [{@smackfsdef={'smackfsdef', 0x3d, '/=)S}@*\xa1!:'}}]}) 00:29:36 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 00:29:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 491.441439][T15313] loop1: detected capacity change from 0 to 264192 [ 491.454588][T15316] ptrace attach of "/root/syz-executor.5"[15314] was attempted by "/root/syz-executor.5"[15316] 00:29:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, r0) 00:29:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:36 executing program 4: get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCGSTAMP(r0, 0x8901, &(0x7f0000000180)) 00:29:36 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x18003, &(0x7f0000000500)=ANY=[@ANYBLOB='nr_inodes=9p']) [ 491.588788][T15313] loop1: detected capacity change from 0 to 264192 00:29:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @in={0x2, 0x0, @private}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @nl=@unspec={0x2}}) 00:29:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @in={0x2, 0x0, @private}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @nl=@unspec, 0x2}) 00:29:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='id_resolver\x00', 0x0, 0x0, 0x0, r0) 00:29:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:37 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x40081271) 00:29:37 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r1, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) 00:29:37 executing program 4: r0 = msgget(0x2, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7091}) 00:29:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:29:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:37 executing program 3: r0 = msgget(0x2, 0x212) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/17) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/92) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000000c0)=""/112) 00:29:37 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:37 executing program 4: msgsnd(0x0, &(0x7f0000000140), 0x8, 0x0) 00:29:37 executing program 1: lstat(&(0x7f00000087c0)='./file0\x00', 0x0) 00:29:37 executing program 2: shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000800000/0x800000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) 00:29:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8903, &(0x7f0000000740)={0x0, @in={0x2, 0x0, @private}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @nl=@unspec}) 00:29:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:37 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}]}) 00:29:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) 00:29:37 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:37 executing program 3: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x28eb440aeb487a9a) 00:29:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='device=./']) 00:29:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 492.767009][T15384] tmpfs: Bad value for 'mpol' [ 492.786611][T15384] tmpfs: Bad value for 'mpol' 00:29:38 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$int_in(r0, 0x5421, &(0x7f0000004840)) 00:29:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$sock(r0, &(0x7f0000002580)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @link_local, 'vlan0\x00'}}, 0x80, 0x0}, 0x0) [ 492.862567][ T37] kauditd_printk_skb: 6 callbacks suppressed [ 492.862584][ T37] audit: type=1804 audit(1617496178.034:152): pid=15389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/260/bus" dev="sda1" ino=14645 res=1 errno=0 00:29:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x29, 0x0, &(0x7f00000000c0)) 00:29:38 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) read(r0, &(0x7f0000004800)=""/1, 0x1) 00:29:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:38 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="2800000001070102000000000000000003000004090001006afae20cf378a4c533e5b3a4be38a765aa8ba9053d49b5249247fe0191736900000800059932dd000000000000000000000000000000000000000095ec7e76aa0b94170731599c9e577c1a4fc56edc1bb7dae65c1736386b80dac641def6e0c7a59cdda23593eb0d6fb9c370c2f7ff7d7a729ec097914388b78ce8ad16d3a4cbc70d9152ba4bf6b72b5ad28d3ef3cba314ac86bdc4591a028686400adf133d19529b59b7b330c172b2ac102939e7362af7e0bf9ee7d13ae933fd64451686b9aae59f8b88bdd06cb32be9b156a5b99114802d1dfa98561ba25e562109bd40060496cb16ed73ae6c47bfdb4cab6b5a65f76ef0fdd3e9f7d91957d4819e860a3bfe82ee025f6b14880ab74f8f95cd777f3e0dc16a49e8be1f6f25f82d070e5e1cfeb20e3578cb34f0730c9d81326ca6d228f6d5a56e5da9db8e5c010f1de152005d83b46fcf675570c68cad97bd5489d1c6cf5c7c60232d43da3f943f27aef26f376d304efc37c79840c3672c0e1a8057cfcd07169075eaf11e02b3c337087cdad7307bc27090ed5af4cccaea580d62972e7a99da6022293bf7bb32dfe57d2b7dc02d51eaca7a2a508034f6010316060aad041df677447282f874d3e5f97fb66178a688caf461c973c9f6d5a827eb1160590250b9061f883b8167f3cbfd3825a0e01a347f534ffe66f45fde647d5cd47f8d6a853f92fbce6557a2036a03684e107ab3da387dd02641bd29284d552140bb01b8858f5c9190101fa2f1ab17644b0e8d5649288451d403d9681d1fc087d84869c4eb36d8000000000000000000", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:38 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) 00:29:38 executing program 1: get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x3) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) 00:29:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) [ 493.275697][ T37] audit: type=1804 audit(1617496178.454:153): pid=15410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/261/bus" dev="sda1" ino=14639 res=1 errno=0 00:29:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:38 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_GET_NUM_DEVICES(r0, 0x5452, &(0x7f0000000040)) 00:29:38 executing program 3: syz_mount_image$tmpfs(&(0x7f00000029c0)='tmpfs\x00', &(0x7f0000002a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003dc0)) 00:29:38 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:38 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:29:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 493.606292][ T37] audit: type=1804 audit(1617496178.784:154): pid=15426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/262/bus" dev="sda1" ino=14642 res=1 errno=0 00:29:39 executing program 2: get_mempolicy(0x0, &(0x7f0000000040), 0x2, &(0x7f0000ffb000/0x2000)=nil, 0x3) 00:29:39 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 00:29:39 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x125d) 00:29:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x10, r1, 0x0, 0x0) 00:29:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:39 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x7, 0x0, &(0x7f0000000040)) 00:29:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7}, {0x2}, {0x6}]}, 0x10) [ 494.211650][ T37] audit: type=1804 audit(1617496179.384:155): pid=15446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/263/bus" dev="sda1" ino=14656 res=1 errno=0 00:29:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:39 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x1278) 00:29:39 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x3) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) 00:29:39 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:39 executing program 4: add_key(&(0x7f0000000080)='id_resolver\x00', 0x0, 0x0, 0xfeffff, 0x0) 00:29:39 executing program 3: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) 00:29:39 executing program 2: syz_mount_image$tmpfs(&(0x7f00000029c0)='tmpfs\x00', &(0x7f0000002a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003dc0)={[{@huge_never='huge=never'}, {@size={'size', 0x3d, [0x0]}}], [{@uid_lt={'uid<', 0xee01}}, {@uid_lt={'uid<'}}, {@subj_user={'subj_user'}}, {@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '/}(^-'}}, {@smackfsroot={'smackfsroot'}}, {@subj_user={'subj_user', 0x3d, '}\\'}}, {@uid_lt={'uid<', 0xee00}}]}) 00:29:39 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x355001, 0x0) 00:29:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 494.688900][ T37] audit: type=1804 audit(1617496179.864:156): pid=15467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/264/bus" dev="sda1" ino=14643 res=1 errno=0 00:29:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)) 00:29:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:40 executing program 3: syz_mount_image$tmpfs(&(0x7f0000002b00)='tmpfs\x00', &(0x7f0000002b40)='./file0\x00', 0x0, 0x0, 0x0, 0x4400, &(0x7f000000bdc0)=ANY=[@ANYBLOB='gid=']) [ 494.873564][T15477] tmpfs: Bad value for 'size' 00:29:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 494.894770][T15477] tmpfs: Bad value for 'size' 00:29:40 executing program 1: syz_mount_image$squashfs(&(0x7f0000000180)='squashfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000001980)) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000001380)='./file0\x00', 0x20000500) 00:29:40 executing program 3: syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x0, 0x0) [ 494.992607][ T37] audit: type=1804 audit(1617496180.174:157): pid=15483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/265/bus" dev="sda1" ino=14651 res=1 errno=0 [ 495.011423][T15489] tmpfs: Bad value for 'gid' [ 495.024984][T15489] tmpfs: Bad value for 'gid' 00:29:40 executing program 2: r0 = msgget(0x2, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x2}}) 00:29:40 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000004f40)={0x0, 0x0, &(0x7f0000004f00)={0x0, 0xffffff7f}}, 0x0) 00:29:40 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000006ec0)='freezer.state\x00', 0x2, 0x0) 00:29:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 495.211688][T15497] Can't find a SQUASHFS superblock on loop1 00:29:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 495.364596][T15497] Can't find a SQUASHFS superblock on loop1 00:29:40 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@known='user.incfs.size\x00') 00:29:40 executing program 3: syz_mount_image$tmpfs(&(0x7f00000029c0)='tmpfs\x00', &(0x7f0000002a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003dc0)={[{@huge_never='huge=never'}, {@size={'size', 0x3d, [0x78]}}], [{@smackfsroot={'smackfsroot'}}]}) 00:29:40 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000280)) [ 495.507363][ T37] audit: type=1804 audit(1617496180.684:158): pid=15517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/266/bus" dev="sda1" ino=14616 res=1 errno=0 00:29:40 executing program 1: r0 = msgget(0x0, 0x248) msgctl$IPC_RMID(r0, 0x0) 00:29:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 00:29:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 495.654902][T15528] tmpfs: Bad value for 'size' [ 495.682673][T15528] tmpfs: Bad value for 'size' 00:29:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x6, r1, 0x0, 0x0) 00:29:40 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x40101283) 00:29:40 executing program 3: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@mpol={'mpol', 0x3d, {'prefer', '=static'}}}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 00:29:41 executing program 1: msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/112) 00:29:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 495.877209][ T37] audit: type=1804 audit(1617496181.054:159): pid=15537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/267/bus" dev="sda1" ino=14307 res=1 errno=0 00:29:41 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0x1263) 00:29:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x0, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 496.045030][T15548] tmpfs: Bad value for 'mpol' 00:29:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{0x0}, {0x0, 0x0, 0x100000001}], 0x0, &(0x7f0000000280)) [ 496.073994][T15548] tmpfs: Bad value for 'mpol' 00:29:41 executing program 4: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 496.106491][ T37] audit: type=1326 audit(1617496181.284:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15547 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 00:29:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='syscall\x00') fcntl$setlease(r0, 0x400, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1) 00:29:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 496.170467][T15553] ptrace attach of "/root/syz-executor.5"[15552] was attempted by "/root/syz-executor.5"[15553] [ 496.216347][ T37] audit: type=1804 audit(1617496181.394:161): pid=15554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir738046550/syzkaller.2DM4bi/268/bus" dev="sda1" ino=14650 res=1 errno=0 00:29:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@resuid={'resuid'}}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, '@\\@'}}, {@subj_user={'subj_user', 0x3d, '\\!@'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) 00:29:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x0, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 496.354049][T15562] loop1: detected capacity change from 0 to 264192 00:29:41 executing program 4: syz_io_uring_setup(0x4439, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x2e2e, &(0x7f0000000200), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x21000000, 0x10ff00, 0x500}) 00:29:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 496.460709][T15572] ptrace attach of "/root/syz-executor.5"[15569] was attempted by "/root/syz-executor.5"[15572] [ 496.469047][T15571] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 00:29:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb5, 0xb5, 0x2, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @union, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], 'y'}]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 496.544904][T15571] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 496.553294][T15562] loop1: detected capacity change from 0 to 264192 00:29:41 executing program 1: open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) acct(&(0x7f0000000080)='./file0\x00') acct(&(0x7f0000000000)='./file2\x00') [ 496.671098][T15584] ------------[ cut here ]------------ [ 496.677195][T15584] unsafe follow_pfn usage 00:29:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x0, 0xfe, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) 00:29:41 executing program 2: getuid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) rmdir(&(0x7f0000003f40)='./file0\x00') syz_mount_image$sysv(&(0x7f0000004300)='sysv\x00', &(0x7f0000004340)='./file0\x00', 0x6, 0x0, 0x0, 0x2004040, &(0x7f00000056c0)={[{'smackfstransmute'}, {'discard'}, {'euid<'}, {'^]'}, {}, {}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x38, 0x34, 0x64, 0x0, 0x0, 0x63, 0x66], 0x2d, [0x36, 0x35, 0x30, 0x35], 0x2d, [0x0, 0x0, 0x63], 0x2d, [0x0, 0x0, 0x37, 0x34], 0x2d, [0x0, 0x37, 0x39, 0x0, 0x0, 0x32, 0x37]}}}]}) [ 496.733101][T15584] WARNING: CPU: 1 PID: 15584 at mm/memory.c:4818 unsafe_follow_pfn+0x20f/0x260 00:29:41 executing program 3: syz_mount_image$sysv(&(0x7f0000004300)='sysv\x00', &(0x7f0000004340)='./file0\x00', 0x6, 0x4, &(0x7f0000005640)=[{0x0}, {0x0}, {&(0x7f0000004540)="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", 0x800}, {&(0x7f0000005540)}], 0x0, &(0x7f00000056c0)={[{'euid<'}, {'^]'}], [{@audit='audit'}]}) syz_mount_image$iso9660(&(0x7f0000006c00)='iso9660\x00', 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0) [ 496.778347][T15584] Modules linked in: [ 496.799594][T15584] CPU: 1 PID: 15584 Comm: syz-executor.4 Not tainted 5.12.0-rc5-next-20210401-syzkaller #0 [ 496.846767][T15584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.890093][T15584] RIP: 0010:unsafe_follow_pfn+0x20f/0x260 [ 496.919374][T15584] Code: 8b 7c 24 20 49 89 6d 00 e8 5e e8 66 07 e9 30 ff ff ff e8 54 df ca ff 48 c7 c7 e0 23 76 89 c6 05 a9 44 0a 0c 01 e8 c2 2a 23 07 <0f> 0b e9 71 fe ff ff 41 bc ea ff ff ff e9 06 ff ff ff e8 2a 92 0f [ 496.920101][T15602] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 496.942113][T15584] RSP: 0018:ffffc90001a3f660 EFLAGS: 00010282 [ 496.952221][T15584] RAX: 0000000000000000 RBX: 1ffff92000347ecc RCX: 0000000000000000 [ 496.960333][T15584] RDX: 0000000000040000 RSI: ffffffff815c1cc5 RDI: fffff52000347ebe [ 496.968334][T15584] RBP: ffff8880301ffb58 R08: 0000000000000000 R09: 0000000000000000 [ 496.976452][T15584] R10: ffffffff815bbb2e R11: 0000000000000000 R12: 0000000021000000 [ 496.984704][T15584] R13: ffff888013e68010 R14: 0000000000000000 R15: 0000000000000110 [ 496.992957][T15584] FS: 00007ff1f3fc0700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 497.000185][T15604] loop3: detected capacity change from 0 to 4 [ 497.003426][T15584] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 497.014933][T15584] CR2: 00007f6ad16b2718 CR3: 0000000026245000 CR4: 00000000001506e0 [ 497.023107][T15584] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 497.031257][T15584] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 00:29:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000003f40)='./file0\x00') [ 497.039262][T15584] Call Trace: [ 497.045428][T15584] ? generic_access_phys+0x440/0x440 [ 497.059493][T15584] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 00:29:42 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10097a4bf107362f6121a82b1e6b6323ffffff47fa69048b6944702bf7bd83923534040b47a734e18ee384398f0ed91fb2dae5085094f975a560e380480abf0b3d302213d954792f1ef52a7d89073500001658f8e3f4b3a6c89511409fa4ccfabf6421aecd56c49ea94e243459d504eeae6df001d82453835679ed5488a701eeac38c13981f16a3c0fea35ae76c3939f5c18be0ccd312f572baf13d513e7063b2ad57f2d8fdaea756c5973110500000000000000cac9b243670acb7fda52da0c235d00a9c5426813f3b5f2e485bd548079741f6f5970bbc66e576494eb7fd8e516d077627b82fd99d44d66bc458b82ad361486231e87fac473bbd3724a9713891143f18bd6a54b2b0b1d1e788ef6b97239fab53fc34db613db823b9a90be5f905a8397b2241be5de31d3f7c71481c53b9a0919f221e7f2b6bc294e932bdba4fec7b0a9762b0bfa7bf013bdb19ca9552f0d03000000c224c23830c890ebf9f437aeccad6912154463884081f347bc9342095b56c7f497b25ae0b20af90c44a28ffc3fa6ee5e552fcf6b43cea1b587c76b510b83b75d5a384a310507ce8d3c97a82a66f82ce7d6ca552631f5a228616674c22fe0fe06e7d5d34a07cc04f245f9623a4c81d7f22a2915c8650d7728b9e3034ca83413daf61e6ea7b0cb9ac00f6cb4886ba5befada0c3a1153f78ffa92a1c1d9c2a7d46e114675b95c3c0b68076c939e05"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0x0, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 497.109599][T15584] ? vmacache_find+0x62/0x330 [ 497.116932][T15604] VFS: unable to find oldfs superblock on device loop3 [ 497.159749][T15584] get_vaddr_frames+0x337/0x600 [ 497.176861][T15584] vb2_create_framevec+0x55/0xc0 [ 497.182881][T15612] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 497.189127][T15584] vb2_vmalloc_get_userptr+0xce/0x4c0 [ 497.214601][T15584] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 497.227841][T15604] loop3: detected capacity change from 0 to 4 [ 497.275090][T15604] VFS: unable to find oldfs superblock on device loop3 [ 497.283090][T15584] ? vb2_vmalloc_dmabuf_ops_attach+0x430/0x430 [ 497.289984][T15612] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 497.334632][T15584] __prepare_userptr+0x342/0x15f0 00:29:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x8001}], 0x0, 0x0) syz_mount_image$omfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000003f40)='./file0\x00') mknodat$null(0xffffffffffffffff, &(0x7f0000007940)='./file0\x00', 0x0, 0x103) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000008f40), 0x0, 0x0) [ 497.393536][T15584] ? vb2_queue_error+0x60/0x60 00:29:42 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00', 0xffffffffffffffff) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ocfs2_control\x00', 0x0, 0x0) timerfd_create(0x1, 0x80800) 00:29:42 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) mknodat(r0, &(0x7f00000007c0)='./bus/file0\x00', 0x8000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) open(&(0x7f00000006c0)='./bus\x00', 0x408000, 0xf618a2f0a7fd109a) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x2d, 0x0, 0x9, 0x5, 0x8, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x1, 0x10000, 0x4}}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@ipmr_getroute={0x1c, 0x1a, 0x100, 0x70bd29, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x3f, 0xff, 0x2, 0xc8, 0x8, 0x2500}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4044001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff48, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) [ 497.423179][T15584] ? kfree+0xe5/0x7f0 [ 497.461357][T15584] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 497.467458][T15584] ? lock_release+0x720/0x720 [ 497.499424][T15584] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 497.528679][T15584] __buf_prepare+0x635/0x7d0 [ 497.541902][T15584] ? vb2_queue_or_prepare_buf+0x675/0x2610 [ 497.553412][T15633] loop2: detected capacity change from 0 to 128 [ 497.560824][T15584] vb2_core_qbuf+0xa9d/0x11c0 [ 497.597364][T15584] ? lock_downgrade+0x6e0/0x6e0 [ 497.623029][T15584] vb2_qbuf+0x135/0x1a0 [ 497.645732][T15584] ? vb2_ioctl_prepare_buf+0x140/0x140 [ 497.653610][T15633] loop2: detected capacity change from 0 to 128 [ 497.708455][T15584] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 497.764891][T15584] vb2_ioctl_qbuf+0xfb/0x140 [ 497.788842][T15584] v4l_qbuf+0x92/0xc0 [ 497.799068][T15584] __video_do_ioctl+0xb94/0xe20 [ 497.829808][T15584] ? v4l_print_control+0x60/0x60 [ 497.834827][T15584] ? v4l_print_control+0x60/0x60 [ 497.849490][T15584] video_usercopy+0x253/0x1300 [ 497.855965][T15584] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 497.864051][T15584] ? v4l_enumstd+0x60/0x60 [ 497.868513][T15584] ? __generic_block_fiemap+0x720/0x740 [ 497.876539][T15584] ? __fget_files+0x288/0x3d0 [ 497.882234][T15584] v4l2_ioctl+0x1b3/0x250 [ 497.886609][T15584] ? v4l2_prio_init+0x20/0x20 [ 497.893133][T15584] __x64_sys_ioctl+0x193/0x200 [ 497.897950][T15584] do_syscall_64+0x2d/0x70 [ 497.903911][T15584] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 497.911044][T15584] RIP: 0033:0x466459 [ 497.915002][T15584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 497.937185][T15584] RSP: 002b:00007ff1f3fc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 497.946732][T15584] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 497.956556][T15584] RDX: 0000000020000140 RSI: 00000000c058560f RDI: 0000000000000005 [ 497.965858][T15584] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 497.977412][T15584] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 497.986567][T15584] R13: 00007ffda067410f R14: 00007ff1f3fc0300 R15: 0000000000022000 [ 498.035653][T15584] Kernel panic - not syncing: panic_on_warn set ... [ 498.042283][T15584] CPU: 0 PID: 15584 Comm: syz-executor.4 Not tainted 5.12.0-rc5-next-20210401-syzkaller #0 [ 498.052280][T15584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.062358][T15584] Call Trace: [ 498.065652][T15584] dump_stack+0x141/0x1d7 [ 498.070042][T15584] panic+0x306/0x73d [ 498.073998][T15584] ? __warn_printk+0xf3/0xf3 [ 498.078621][T15584] ? __warn.cold+0x1a/0x44 [ 498.083068][T15584] ? unsafe_follow_pfn+0x20f/0x260 [ 498.088214][T15584] __warn.cold+0x35/0x44 [ 498.092490][T15584] ? unsafe_follow_pfn+0x20f/0x260 [ 498.097736][T15584] report_bug+0x1bd/0x210 [ 498.102153][T15584] handle_bug+0x3c/0x60 [ 498.106333][T15584] exc_invalid_op+0x14/0x40 [ 498.110865][T15584] asm_exc_invalid_op+0x12/0x20 [ 498.115735][T15584] RIP: 0010:unsafe_follow_pfn+0x20f/0x260 [ 498.121482][T15584] Code: 8b 7c 24 20 49 89 6d 00 e8 5e e8 66 07 e9 30 ff ff ff e8 54 df ca ff 48 c7 c7 e0 23 76 89 c6 05 a9 44 0a 0c 01 e8 c2 2a 23 07 <0f> 0b e9 71 fe ff ff 41 bc ea ff ff ff e9 06 ff ff ff e8 2a 92 0f [ 498.141117][T15584] RSP: 0018:ffffc90001a3f660 EFLAGS: 00010282 [ 498.147210][T15584] RAX: 0000000000000000 RBX: 1ffff92000347ecc RCX: 0000000000000000 [ 498.155295][T15584] RDX: 0000000000040000 RSI: ffffffff815c1cc5 RDI: fffff52000347ebe [ 498.163288][T15584] RBP: ffff8880301ffb58 R08: 0000000000000000 R09: 0000000000000000 [ 498.171282][T15584] R10: ffffffff815bbb2e R11: 0000000000000000 R12: 0000000021000000 [ 498.179273][T15584] R13: ffff888013e68010 R14: 0000000000000000 R15: 0000000000000110 [ 498.187275][T15584] ? wake_up_klogd.part.0+0x8e/0xd0 [ 498.192569][T15584] ? vprintk+0x95/0x260 [ 498.196778][T15584] ? generic_access_phys+0x440/0x440 [ 498.202097][T15584] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 498.207851][T15584] ? vmacache_find+0x62/0x330 [ 498.212676][T15584] get_vaddr_frames+0x337/0x600 [ 498.217573][T15584] vb2_create_framevec+0x55/0xc0 [ 498.222549][T15584] vb2_vmalloc_get_userptr+0xce/0x4c0 [ 498.227966][T15584] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 498.233717][T15584] ? vb2_vmalloc_dmabuf_ops_attach+0x430/0x430 [ 498.239907][T15584] __prepare_userptr+0x342/0x15f0 [ 498.244975][T15584] ? vb2_queue_error+0x60/0x60 [ 498.249783][T15584] ? kfree+0xe5/0x7f0 [ 498.253789][T15584] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 498.259816][T15584] ? lock_release+0x720/0x720 [ 498.264535][T15584] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 498.270554][T15584] __buf_prepare+0x635/0x7d0 [ 498.275174][T15584] ? vb2_queue_or_prepare_buf+0x675/0x2610 [ 498.281013][T15584] vb2_core_qbuf+0xa9d/0x11c0 [ 498.285721][T15584] ? lock_downgrade+0x6e0/0x6e0 [ 498.290603][T15584] vb2_qbuf+0x135/0x1a0 [ 498.294789][T15584] ? vb2_ioctl_prepare_buf+0x140/0x140 [ 498.300283][T15584] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 498.306216][T15584] vb2_ioctl_qbuf+0xfb/0x140 [ 498.310967][T15584] v4l_qbuf+0x92/0xc0 [ 498.314980][T15584] __video_do_ioctl+0xb94/0xe20 [ 498.319874][T15584] ? v4l_print_control+0x60/0x60 [ 498.324854][T15584] ? v4l_print_control+0x60/0x60 [ 498.329829][T15584] video_usercopy+0x253/0x1300 [ 498.334631][T15584] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 498.340908][T15584] ? v4l_enumstd+0x60/0x60 [ 498.345369][T15584] ? __generic_block_fiemap+0x720/0x740 [ 498.350969][T15584] ? __fget_files+0x288/0x3d0 [ 498.355698][T15584] v4l2_ioctl+0x1b3/0x250 [ 498.360060][T15584] ? v4l2_prio_init+0x20/0x20 [ 498.364776][T15584] __x64_sys_ioctl+0x193/0x200 [ 498.369573][T15584] do_syscall_64+0x2d/0x70 [ 498.374018][T15584] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 498.379939][T15584] RIP: 0033:0x466459 [ 498.383851][T15584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 498.403485][T15584] RSP: 002b:00007ff1f3fc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 498.411927][T15584] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 498.419923][T15584] RDX: 0000000020000140 RSI: 00000000c058560f RDI: 0000000000000005 [ 498.427922][T15584] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 498.435917][T15584] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 498.443914][T15584] R13: 00007ffda067410f R14: 00007ff1f3fc0300 R15: 0000000000022000 [ 498.453011][T15584] Kernel Offset: disabled [ 498.457537][T15584] Rebooting in 86400 seconds..