0x1c}, 0x1, 0x0, 0x0, 0xc010}, 0x4048040) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000000000)=0x7ff, 0x80000000) 10:15:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:29 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$SOUND_PCM_READ_BITS(r2, 0x80045005, &(0x7f0000000100)) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x13, 0x1, 0xda, &(0x7f0000000180)}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:29 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff0000/0x9000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180)="06c845db5b827c51b29d5dcde92e507a0e3597af066d62202cc170d359c313aab29fcbc011f0fc2f7d4b18b2f84fd34333adac5f990abe45f378171a4dc7a39ed63dc9e6e1c55b89f470abbe888cf77671d01094e7c4678435fa9e13d481b4d88c54d655e7e43cb6ab42293bf65a9a5ac5ed3623be66dfe71c93304e8da56e3c2dd40892f737c9899521adc4f839844c9d430791bb2fff13629360f4b1f9887fcc267162d4c34e72b401adced4ff4d9e48fd1188a5a321cd225ddc9fbea699a676281bdcdd8bc2881d05e1e057d8a3ede132150407778948023c26", 0xdb, r0}, 0x68) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-control\x00', 0x101000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={r4}, 0x9c) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e23, 0xcc, @private2={0xfc, 0x2, [], 0x1}, 0x80}}, 0x2, 0x3, 0x1, 0x4, 0xb0, 0x202b, 0x16}, &(0x7f0000000480)=0x9c) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRES32=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRES64=r5], @ANYRESDEC=0x0, @ANYBLOB='\b\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1097.685853][ T27] audit: type=1804 audit(1588155329.864:346): pid=31836 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/891/bus" dev="sda1" ino=16034 res=1 10:15:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000b24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="e664426c0ab10a9a5d480d72cfeb3f5d592e8c663726e635d6c21b2b61d28839e4330d3bc408d6a038fd8451366218518ba0f97f840da087e548cf654392f1d1f56ac0a262f14cc8f20797dc11e256fbf6f478d8a9f5b1a7c2990224", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @loopback}, {0x2, 0x4e20, @rand_addr=0x64010100}, {0x2, 0x4e23, @local}, 0x2, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)='veth1_virt_wifi\x00', 0xff, 0x7f, 0x8001}) [ 1097.868974][T31853] fuse: Bad value for 'fd' [ 1097.998943][T31858] fuse: Unknown parameter 'ædBl [ 1097.998943][T31858] ± [ 1097.998943][T31858] š]H rÏë?]Y.Œf7&æ5ÖÂ+aÒˆ9ä3 ;ÄÖ 8ý„Q6bQ‹ ù„  ‡åHÏeC’ñÑõjÀ¢bñLÈò—ÜâVûöôxØ©õ±§Â™$0x0000000000000003' [ 1098.077650][T31861] fuse: Unknown parameter 'ædBl [ 1098.077650][T31861] ± [ 1098.077650][T31861] š]H rÏë?]Y.Œf7&æ5ÖÂ+aÒˆ9ä3 ;ÄÖ 8ý„Q6bQ‹ ù„  ‡åHÏeC’ñÑõjÀ¢bñLÈò—ÜâVûöôxØ©õ±§Â™$0x0000000000000003' 10:15:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:32 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000180)=0xffffff7f, 0x4) r2 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={r5}, 0x9c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r5, 0x4) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000100)={'wg1\x00', {0x2, 0x4e22, @multicast2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r6}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r6, 0x0) ioctl$RTC_UIE_OFF(r6, 0x7004) r7 = socket(0x2000000000010, 0x80000000002, 0x0) write(r7, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r7, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x2, 0x8, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c084}, 0x50) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000c24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:32 executing program 5: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x5, @any, 0x1ff}, 0xe) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64483d01303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c36c66775705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:32 executing program 3: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0xa30000, 0x7, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990a30, 0xa0000000, [], @p_u32=&(0x7f0000000040)=0x812}}) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000180)=0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000001c0)=""/77) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @random="c252600b7ed2", 'bridge0\x00'}}, 0x1e) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000000140)=0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') r5 = dup(r4) io_submit(r3, 0x1, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r6, 0x0) io_cancel(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x9, 0xffffffffffffffff, &(0x7f0000000240)="98ae37355d6d2167ffa98095a822cc185c1931e43ad9fe07b8cc624973211e0dfdc92d461e208a335a68285a042c081289f25572a8b74321830d177579f69891ceb3dd364ef76a4da70ab98e16c8230012a3edcf131efac16a3a9041c30bf74269d406a410b772454b1ad197dff24a3a8bb66f7936c12eb7cd9a8da0b88e8aa4c3d32dd1e0569fdeed055e1969ae21c2d0ad47a54d86ea56e057f4cd805983bed7deed83", 0xa4, 0x80000001, 0x0, 0x2, r6}, &(0x7f0000000340)) write(r1, &(0x7f0000000000)='$', 0x1) [ 1100.443232][T31891] fuse: Unknown parameter 'rootmodH' [ 1100.472691][T31891] fuse: Unknown parameter 'rootmodH' 10:15:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 10:15:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000e24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0x1, 0xc80) ioctl$CAPI_INSTALLED(r3, 0x80024322) r4 = open(&(0x7f0000000100)='./file0/file1\x00', 0x4000, 0x19) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0/file2\x00', r4, &(0x7f0000000180)='./file0/file1\x00', 0x4) mount$fuse(0x0, &(0x7f00000000c0)='./file0/file1\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030343087f1d44c38902f9c65725f69643de5b847aa4f472b35e5ddd59654c3d17dfae051a45c9b433059ad7641ec320221914539564326158be4e732bc0b1701609d3d6aa522b1bcaa8846b143c15203235aade741549f23f70b97fa09270c07d75f53022ca736898e18e4d8d83a572b04563f4575f03fd5c75952fd89b046b7a6ea0cec489521", @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000f24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:33 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @link_local, 'bridge0\x00'}}, 0x1e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2000000, 0x10012, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xa000, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x10010, r1, 0xc9dda000) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) socket$pppoe(0x18, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="e4242e11715fa18dc6438beb913a788a24ad60d208e49b36bbb395be9a9e7d9f651052cc79d0e62fdb11f397f63a023f3e345e5b95be873065a64296ef416458041bfdd0a84c5aa5d0f9c449b8999b90fedcb5d68ab19c88b843d8cac67f5e4ed24dec00d5279ff4cc87e0950d4f79feea457ccd65f8ce7f65db05f7312bfae65c5bf3db", 0x84) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x10001, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = socket(0x2000000000010, 0x80000000002, 0x0) write(r4, &(0x7f0000000180)="240000009300edfc0e2d012a422351862a0000000008000100480600000000000000", 0x22) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000080)={r7}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000180)={r7, @in={{0x2, 0x4e20, @local}}, 0x6, 0x9}, 0x90) 10:15:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0/file0/file0\x00', 0x91) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="400000000a146b3438841cde010025bd7000ffdbdf25080015000100000008000100020000000800150003000000080015000100000308001500000000000800000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20004010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202c00, 0x0) r4 = socket(0x2000000000010, 0x80000000002, 0x0) write(r4, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendto$unix(r0, &(0x7f0000000440)="80ae0ff8d1e1df958dde022e2e67385646e4d7248490dcaea7f5dad15e41631cbf074e44e4e885d4f242164195f48a6db07ea2c8826bb9f2d39c6893cb5fcdd98234bd57d0b4f894f56d9cea06025905a1e39884cdf626805d6a9e2eb21eb08929a99cb3d6838e1d163638de66b1b25b", 0x70, 0x440d5, 0x0, 0x0) accept$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$SNDRV_PCM_IOCTL_LINK(r3, 0x40044160, &(0x7f0000000100)=0x7) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1101.083857][T31922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=147 sclass=netlink_route_socket pid=31922 comm=syz-executor.3 [ 1101.168435][T31926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=147 sclass=netlink_route_socket pid=31926 comm=syz-executor.3 10:15:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001124000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:35 executing program 5: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000180)={'dummy0\x00', 0x0, 0x8}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="662ed627a9f96e660b322c2eaaaae9dc1734970220564242e44f36658ec33ed79639216f15dfb8dd7c561c54d0520d1d4cecd5e889494f851bbd5494e12e4c5348a7ddafd0eb475fcf600001000000000000d077990fc11b0bc4f22e2930087c4c1bee1e5df4ec78298d8624d439e55685cc5c970bd4901760d27ba1d46292b4ad30f04671d053a0501f7aa322f26c684edb5433c3006050426a93423ec53c7bfdc6f845c0d2dbd71551679777c895f72efa3cefafde248d20e7970f2f766d27c95c8bddd99bab7b49b28f06a8dee5324424ea6d6bc9af8f703118a578", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r2 = socket(0x2000000000010, 0x80000000002, 0x0) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000380), 0x4) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0xb, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_COMPAT_NAME={0x16, 0x1, 'self^cpusetvmnet0\x00'}, @NFTA_COMPAT_NAME={0x6, 0x1, 'fd'}, @NFTA_COMPAT_NAME={0xb, 0x1, 'user_id'}]}, 0x40}, 0x1, 0x0, 0x0, 0x8840}, 0x40000) 10:15:35 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x7f, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="5d757acfa2eab056f93ab4866272c828ce57c2eff60380d59cc1103055b455afe3911977a890dd665b2a7e32607ebc5dc5a0a2ce615a0aaea4b9bc704e086b38b1ac153cc58caf3b80058d7faab38885b0aab426bafcd1fe4b707bb33ff64942e20727a5ff46bd1c6f3c9051fd344783e7e887278307d565943f880d1d3dc2009406476e79", 0x85, 0x8}, {&(0x7f0000000240)="8737b3e17baf583fbba63ca23d16d216ef46628b889570a1020ed0aeda8e1055b36b323db8627d8ff95ee03873458c721c6be8d6a39ff5486a7fc72ca7482c52ca7d1f1cc2ab38c574da042bbc39643045c0f9909c5af7a40421eda964051a5ddaef9958eae7", 0x66, 0x3}, {&(0x7f00000002c0)="8f181360731ec6d555d38554b7d904f4f832bdc13f7fcf5d5e46205675a92d488220aae4bc78273332f816b77bcf14347154bf0b748b56c0bb8f756ea5553d6a52a687652362f92d8ec5028586669ff538e3ce1d9d1a80e5757567f3ba1f4509c99df26107231d1d4313efbd0cac22b73ff8b445d213c325fbe18e857030048e6fc39fc38c191ced5394e21987effd0a910361", 0x93, 0x1f}], 0x4481, &(0x7f0000000400)={[{@nodots='nodots'}, {@dots='dots'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'keyring-'}}, {@uid_lt={'uid<', r3}}, {@euid_eq={'euid', 0x3d, r5}}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x37, 0x66, 0x33, 0x62, 0x65], 0x2d, [0x33, 0x62, 0x32, 0x62], 0x2d, [0x0, 0x31, 0x33, 0x31], 0x2d, [0x0, 0x0, 0x39, 0x33], 0x2d, [0x65, 0x34, 0x64, 0x37, 0x31, 0x36, 0x38, 0x34]}}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r7}}]}) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ip_vti0\x00', 0x1}) r1 = socket(0x2000000000010, 0x80000000002, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={r4}, 0x9c) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000080)={r7}, 0x9c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={r4, 0x7, 0x9, 0x100, 0x7fff, 0x80, 0x2, 0xd5e, {r7, @in6={{0xa, 0x4e22, 0x4, @remote, 0x3}}, 0x7, 0x7f, 0x2, 0xbbf7, 0xff}}, &(0x7f00000001c0)=0xb0) write(0xffffffffffffffff, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$TIPC_NL_MEDIA_GET(r1, 0xfffffffffffffffe, 0x88) r8 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x200004) r10 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./bus\x00', 0x400, 0x9, &(0x7f0000001740)=[{&(0x7f0000000280)="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", 0x1000, 0x9e0}, {&(0x7f0000001280)="ff3f6ee35c7770db6858177f441046e9d94a223bc8fbe00a168778bb711092c6ef07430a6cac74d2be9ee55ba999747eebf3371eb111228a91e7bcc6e79ed2", 0x3f, 0x4}, {&(0x7f00000012c0)="41343be412284cec0706445f71a1935a9f7b509d46199a0680b97ce10c60b33a", 0x20}, {&(0x7f0000001300)="ec042e04c7d84fae316a57cecf18e4ad50bc24c0991bf16e01519b870e4f47c8dc536fbd248f31196af69c6beca982b17d7ab0816860e2363235fc8c62aba004c400ed55008b69448408785460d934dc22f15a8892fc0e5103454fced878ede7995a7851da68b0df0b38729e4207f79462f68d56b26e385cefda7229d98ab939c90cb84e980b186ea176f028ec0c386d58f3f37a9b5ba59b99f3d6e49a07a62de5f05c2c51783d5fc7afa6ba9aa22a3f41cc43600022cf9430f93f64721861ba0cf123509dd04bbcf4d81781720969bc44736a61", 0xd4, 0x2}, {&(0x7f0000001400)="f184596af79a47bf084c290552e3b378140756c3c84e0314f14a55f20d99f937051c3b188738144505ba345ae9b5ae66633974c4b71a44f6f178b8156ad0", 0x3e, 0x8000}, {&(0x7f0000001440)}, {&(0x7f0000001480)="d637104eb27f64c87535f26c4649ab8774e79eedac868e67a7e01ca5376a5b1d069959f8bdb3d5fe9120f9a419e7b9f19f20f749a2b349d4f243c5e861c8db0f184bd8dcaf1f3b69f37b707ccebf6fe83934331a2d6d5a84cfb97de48a14636d16bf8d247bb55d875154675e330356cf702b343bb6d46346acddb39466fd0a02803aef4ddb5269438d5cc0d804256a4a9a15abb966a9e008bad4", 0x9a, 0x1ff}, {&(0x7f0000001580)="565864208f66896542f9542e3cbf37c97894cc687193e9bd565252d556ca0e8d318399d9daf6bf30e3b4821cd227c4bffee1a1e50316fef4fc61dd6ac90b0acacc0c435c91a5c1b9d879d340445e48dae12567fcd6cc55187c0a9fd130b836a3c7ef525395f309e57263a98c96e7c23f179212f0065cd0d46dbde390c5217b67576a8d92ee1ae1a494bfa0e5ec3e9758aebe92a0d92c95e8d2f4c81823486eef102d4f0305f9b3dce1d9cfca2daaa0", 0xaf}, {&(0x7f0000001640)="b1a000aee7296584a521dc9cdeead5345022ddc7c1469869a32139c5807a5d74a755f2c778885e48c48c0d7093f655a03470b0a2b8014f524f12683ac2ebc3bbde362888e431a2bd3958b3b1fa0cd69511868e8a75634724f052390f912d2c47b521705a67f6a52ce723d5b102245b650d8419fbeeebc92daea995d7b07ec9362310a821134acc79e25f612920e2b14677ff17cbf60d64086f7ce32dc74f4eb5f65e8a2335c7185ce0bae44ae1ac6f412e49a957793ba96fa9bafd31e6ed9a55fb550f77b68d400ffcca95da5a61f41a4e1b2a5fcb7c89fd", 0xd8, 0x100}], 0x104000, &(0x7f0000001900)={[{@commit={'commit', 0x3d, 0x1}}, {@spectator='spectator'}, {@spectator='spectator'}, {@quota_on='quota=on'}, {@lockproto_nolock='lockproto=lock_nolock'}, {@data_writeback='data=writeback'}, {@loccookie='loccookie'}, {@upgrade='upgrade'}, {@meta='meta'}], [{@smackfshat={'smackfshat'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '/dev/adsp1\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, ')eth1userbdev'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@fowner_gt={'fowner>'}}]}) sendfile(r8, r10, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1103.297022][ T27] audit: type=1804 audit(1588155335.474:347): pid=31935 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/892/bus" dev="sda1" ino=16286 res=1 [ 1103.339169][T31938] fuse: Unknown parameter 'f.Ö'©ùnf 2' [ 1103.349989][T31938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=31938 comm=syz-executor.5 [ 1103.392048][T31938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12409 sclass=netlink_route_socket pid=31938 comm=syz-executor.5 [ 1103.427528][T31948] fuse: Unknown parameter 'f.Ö'©ùnf 2' 10:15:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001224000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 10:15:35 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6, 0x4010, r2, 0x0) r3 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000080)=0x1) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) socket$alg(0x26, 0x5, 0x0) 10:15:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_gt={'fowner>', r2}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@euid_eq={'euid', 0x3d, r6}}, {@uid_lt={'uid<', r8}}, {@subj_role={'subj_role', 0x3d, 'group_id'}}, {@euid_lt={'euid<', r10}}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001324000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1103.842995][T31968] fuse: Unknown parameter 'fowner>00000000000000001791' [ 1103.900237][T31968] fuse: Unknown parameter 'fowner>00000000000000001791' 10:15:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c003955a6fe0c30a6a8a2bce9a8088166cfdedfb260fcb3b7467acc630e6936e26bdf86e008a656a98f875362519f10c275dae2e303e35ef1c9a44855359ccda0de71a77db04f98d165ea78e4d0732513e84ba6f2611fa36c13d783f418d880298f98188467f596cf676096ab840052445990e5a03c8308"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x1) 10:15:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001424000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:38 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'batadv0\x00'}}, 0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000003f24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:38 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x602d80, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000000c0)={0x39, "18a2eb1605f16c031dfc84e740f40c26f7fb14ce8b5ee4e2249cc50b09289c8666c9188b38a8d5ddb8c6d5474d56b6d71a3858df5272874f25"}) ftruncate(r1, 0x200004) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "eea1043b87af9ae7", "7aba455df78d1c28f4fc7c4336ed3902071502e8e9856b2c82ff1ab9ca093a34", "53cbe559", "1815d8a46e26c07e"}, 0x38) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000001c0)={'caif0\x00', 0x4000}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r7 = gettid() write$cgroup_pid(r6, &(0x7f0000000140)=r7, 0x12) [ 1106.465177][ T27] audit: type=1804 audit(1588155338.645:348): pid=32008 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/893/bus" dev="sda1" ino=16256 res=1 10:15:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000655824000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 10:15:39 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0x8, 0x9, 0x4, 0x1000000, 0x101, {0x0, 0x2710}, {0x1, 0xf, 0x0, 0x4, 0x3, 0x4, "447db60a"}, 0x20, 0x2, @userptr=0x101, 0x8, 0x0, r2}) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000100)={@multicast2, @multicast2}, &(0x7f0000000180)=0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000006024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000586524000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000087324000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x0, 0x2, [@broadcast, @remote]}) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0061db8d6cc59c705521cf3283f935e8921e3d7c26a24dde4edcd8c86e657821410fceec118ce4c54ad5f4cf1f041780b00b44fa457f225a95"]) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000000)=0x3220, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = accept$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) tee(r3, r2, 0x8, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) read$fb(r2, &(0x7f0000000300)=""/144, 0x90) 10:15:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000008124000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:41 executing program 3: read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/252, 0xfc) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bridge\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20004008) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012bbd7000fddbdf25020000002b00070073797374656d5f753a6f626a6563745f723a7379736c6f67645f7661725f72756eedeacfe8f0238634000300fe8000000000000000000000000000aa08000400ac1e01011400060076657468315f6d616376746170000000"], 0x70}, 0x1, 0x0, 0x0, 0x40010}, 0x8000) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x101041, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3000006, 0x10012, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:41 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r3 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r3, 0x1000008b11, &(0x7f0000000000)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}}, 0x800, 0x80, 0x54ad, 0xfffff7b3, 0x0, 0x7, 0x7}, 0x9c) [ 1109.500497][ T27] audit: type=1804 audit(1588155341.675:349): pid=32059 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/894/bus" dev="sda1" ino=16252 res=1 [ 1109.529078][T32062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=32062 comm=syz-executor.3 [ 1109.612166][T32072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=32072 comm=syz-executor.3 10:15:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000f024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000080)=0x9b, 0x4) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:15:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000000f000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1d}, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) write$nbd(r2, &(0x7f0000000080)={0x67446698, 0x0, 0x3, 0x0, 0x2, "1b6cf7fa6c4d1db447b2fe3b2861efed4ddb62d34f98339061b499efa0448bb760b0276f9597ff76227ff019f689280def13f8990b0eae39555aa162a13718c8e2ec8ee3e77abd83570b7fab1db8b2b781361863eee3baabc8a7237d99c188b74eb0d7d818a5a0485718d455e1bf3f8f6f03cbf6bf3caff1e08107d8dab9fc209d5d133b4cf5d3074c825cb8e0b416"}, 0x9f) [ 1110.104212][T32093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=32093 comm=syz-executor.1 10:15:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) write(r2, &(0x7f0000000080)="471f9f8a753a888e49fba86f5c7d56ec3c671d012bfb", 0x16) [ 1110.182647][T32093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=32093 comm=syz-executor.1 10:15:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000011000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1110.345240][T32105] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.411124][T32105] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:15:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1f}}]}}) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)='overlay\x00', 0x400, &(0x7f0000000240)={[{@index_on='index=on'}, {@xino_auto='xino=auto'}, {@index_off='index=off'}, {@xino_on='xino=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0/file0'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'user\x88A++'}}, {@seclabel='seclabel'}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x38, 0x0, 0x8, "fd2b97066fdffa79c89e9e7ea048fc99", "6021f75ac3eac5176066c0cd2169a23709c3db28a0db3519e89ed10b4b892e5c6d4038"}, 0x38, 0x2) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x20f0, 0x0) 10:15:44 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:44 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x42c002) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7fc, 0x80000000) [ 1112.538890][T32117] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1112.589487][ T27] audit: type=1804 audit(1588155344.765:350): pid=32122 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/895/bus" dev="sda1" ino=16250 res=1 10:15:44 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x404000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) rt_tgsigqueueinfo(r1, r2, 0xf, &(0x7f00000001c0)={0x36, 0x80, 0x10001}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) unlink(&(0x7f0000000180)='./file0\x00') ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x10000, &(0x7f0000000080), 0x8, r3, 0x8}) [ 1112.639393][T32117] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:15:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000013000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1112.832479][T32135] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1112.912744][T32135] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:15:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:15:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000014000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:45 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x1000, 0x1000, 0x0, 0x6250c23c, 0xbb, 0x8}) 10:15:45 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000015000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0xf7, r4, 0x1, 0x0, 0x6, @dev={[], 0x22}}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x4000000000000eb, 0x0) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f00000002c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x81, 0x5, "d50ffa99acb0489c0926ab53fbe733caa0bc76a4f579a6bfff8babae1902889bb984004a14e43c72168362e5cb5b1d555bbf7ce8a36b4b9eac02691e087087", 0x15}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)="53e05901331147d1633d58db96da70f9b4cbc66270e39c5331967831690541ab7f7f1dcde6c5a7ca2f42629b339e80df0d52694131f3998cf3391849a1cbbd4b370eeaf07edaa5da0de59808d67d4dbc907675b54a050443067bcb8251752f3668cd4a9847d79d938e78380d1b3f058355c7a36aae737798b26e90365d01063f9682f265deb9f535d1e8d8e98e8228af852c286b1a2740f6e6ef5a2e7533e47f739750de1bb6239c7959e6fa3280553e98c60337ffe0f6c781242eff", 0xbc}, {&(0x7f0000000400)="1a731f6a09e0248196eeb8049a9d6f1781c3bc4a635897dbdaf06ae9d0", 0x1d}, {&(0x7f0000000440)}], 0x3}}], 0x1, 0x40000) r8 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r8, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010000005bc10c198ea1c4b1d64331a0b", @ANYRES32=0x0, @ANYRES16=r1, @ANYRES32=r5, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYRESDEC=r6, @ANYRES32=r5, @ANYRES64=r7, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYRESOCT, @ANYRES16, @ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYPTR, @ANYRES64, @ANYRES32], @ANYRES32]], 0x5}, 0x1, 0x0, 0x0, 0x24040000}, 0x0) sendto$packet(r1, &(0x7f0000000080)="39b4462d3b454bcb7a51626c9c62c4ddf88d472f87434d438c26865c63ebfa7a74ca0f4e43fd062ad5063842708e407769c3ad059178a87ccaa8efde1432c1c80b8c5207afafa49ba9097b1fae10603a8597722fbd6f4bb3fe76713fbefb006a1c2c431bb88ae356c7379b1394cfc24ce20fadb82cdec559654e47", 0x7b, 0x4004045, &(0x7f0000000100)={0x11, 0xf7, r5, 0x1, 0x84, 0x6, @dev={[], 0x2f}}, 0x14) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000016000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000180)=""/221) linkat(r0, &(0x7f0000000000)='./file0/file1\x00', r1, &(0x7f00000000c0)='./file0/file0\x00', 0x400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000017c0)={0x0, 0x8, 0x9c, "a968f5269412a7702449693a0b6571036cb505d22f11b6d1f5cf07cccf1b42685906ea0a0db3bdecd01a5c2e14515e9fb29126b89b977e6bae591306f57776437c95331f0766f84ad7cce29dacc717ea997be8c40e1bc8aa913f6b78a6b12bc7eac401a69a036132ec3894e228b582ab6866c13c0031ae687daac7ecbd6de3546cda1fc6924bf2ee5b73b177758fa81afad6a4455183ad8a1b720de9"}, 0xa4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r6 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r6, 0x1000008b11, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000100), 0x4) 10:15:47 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0xa2) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000000c0)=""/211) 10:15:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@obj_type={'obj_type', 0x3d, '/dev/fuse\x00'}}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000018000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1115.746102][T32188] fuse: Unknown parameter 'obj_type' [ 1115.760371][ T27] audit: type=1804 audit(1588155347.935:351): pid=32186 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/896/bus" dev="sda1" ino=16371 res=1 [ 1115.772007][T32188] fuse: Unknown parameter 'obj_type' 10:15:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:15:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000000c0)=""/120) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:48 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @empty, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket(0x1f, 0x80000000002, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000000)) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl(r1, 0x4e, &(0x7f0000000200)="4350b79982ee570f8885f4bda92e77073d46f2a3fe1736de047c9bfc4b1fd5ec43540270c7a97805a572da5e5afa555e3fb01f48436a7a3d6392bed06df5ddd861c463b50800101bbddb055706974cb5456ec52f90888a0d3596d91230a58fa57b0b2b701db1557f923d44859c6e78d26d572ffb8964e341bf00f94bde9a46176739b7fb0ecc9bccaf691abae026701dcc103f2881f73d5d8d0eab6d2581920ddc8f0c71665d69790b") ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000180)={0x9, 0x4}) write(r0, &(0x7f00000001c0)='$', 0x1) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x20000, 0x0) write$P9_RSTATFS(r4, &(0x7f00000000c0)={0x43, 0x9, 0x2, {0x9, 0x3, 0xffff, 0x5, 0x7f, 0x3f, 0x80, 0x8, 0x1}}, 0x43) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r5, &(0x7f000000d180), 0x4000000000000eb, 0x0) close(r5) 10:15:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000019000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:50 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x1001f, r0, 0x17e2c000) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:50 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000040)='./file0\x00', 0x400800, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:15:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={r5}, 0x9c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r6, @in={{0x2, 0x4e23, @empty}}}, &(0x7f0000000280)=0x84) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x2f3) ioctl$VIDIOC_SUBDEV_S_SELECTION(r7, 0xc040563e, &(0x7f00000000c0)={0x1, 0x0, 0x102, 0x2, {0x2, 0x1, 0xffffffff, 0x9}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x240f1, 0x21) 10:15:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001c000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1118.954427][T32255] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1119.044230][T32264] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1119.089934][ T27] audit: type=1800 audit(1588155351.266:352): pid=32251 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16331 res=0 10:15:51 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x20) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getpeername$ax25(r3, &(0x7f0000000140)={{0x3, @netrom}, [@netrom, @remote, @remote, @bcast, @default, @rose, @rose, @bcast]}, &(0x7f0000000040)=0x48) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, @default, @rose={'rose', 0x0}, 0xffffffff, 'syz1\x00', @null, 0x0, 0x7, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:15:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) read$FUSE(r1, &(0x7f0000000440), 0x1000) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000240)={0x0, 0x7, [0x442, 0x0, 0x8, 0x5, 0xd5e], 0x8}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) getresgid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f00000000c0)=0x7, 0x4) fremovexattr(r2, &(0x7f0000000000)=@known='system.advise\x00') 10:15:51 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000080)={0x2d, 0x1}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmsg$AUDIT_SET_FEATURE(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x3fa, 0x0, 0x70bd2d, 0x25dfdbfc, {0x1, 0x1, 0x0, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000840) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x10012, r3, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000180)={0x9, "d2d7777cd9b27072edf3fd82dd9364b9654ac3dc090000000000000043b86400", 0x4, 0x5, 0x9, 0x4, 0x2}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x64, &(0x7f00000004c0)=[@in6={0xa, 0x4e20, 0x3, @mcast1, 0x6}, @in={0x2, 0x4e24, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x22}, 0xffffffe1}, @in6={0xa, 0x4e21, 0xfff, @private0, 0x4}]}, &(0x7f0000000240)=0x10) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000540)) sendmmsg(r6, &(0x7f000000d180), 0x4000000000000eb, 0x0) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000280)={r5, 0x2e4}, &(0x7f00000002c0)=0x8) 10:15:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001d000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1119.344498][ T27] audit: type=1804 audit(1588155351.526:353): pid=32277 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/898/bus" dev="sda1" ino=16247 res=1 10:15:53 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @multicast, 'bond_slave_1\x00'}}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) r3 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x190) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x204004c, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000100)={0x3, 0x7, 0xfffffffffffffbff}) 10:15:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001e000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) read$FUSE(r1, &(0x7f0000000440), 0x1000) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1121.803836][T32306] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 10:15:54 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10015, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) [ 1121.872481][T32306] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 10:15:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000020000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:54 executing program 5: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'filter\x00'}, &(0x7f00000007c0)=0x54) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000008c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000840)=ANY=[@ANYBLOB="1400000003070103000000030000050000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20004080}, 0x4048001) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r3 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c20aa00ec309aad0a16705370199a3f09f05285968ef75a168f86d5fede89e1a5a9a213bf8dd40a8305000000000000001181fd4ab1d237a19d4debd2575111c75804af69fa169baf62a43a77a7335ccaf9e19415355f0beb622b8bf5c01495a96c615303738248a1b878878b01f1090307f8e99776e7fed9eaf3eeebd2248810dc59e22b38a57421a8dd31bbf068d32e130e798016fbad49392a3973105022715c676d2b", @ANYRES16=r2, @ANYBLOB="230900000000000000000100000005000700000000000800090000000000060002000100000008000a000000400008001700", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c891}, 0x4) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x8, 0x2, 0x8, 0x8000, 0x7], 0x6, 0x81, 0xffffffdd, 0x2, 0xfff, 0x2, 0x6, {0xc3a, 0x9, 0x6, 0x9, 0xda, 0x2, 0x9, 0x4, 0x6f, 0x35, 0x2, 0x8, 0xfffffff9, 0x6, "b615f353c933e518a5133829899680014b3fec1828c15cd9ff904aacf9324342"}}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x2e000, 0x30) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r4, 0xc2604110, &(0x7f0000000440)={0x94, [[0x1000, 0x8, 0x0, 0x1, 0x7260ca47, 0x8, 0xffffffff, 0x896b], [0x852e7fa9, 0x8000, 0xaa01, 0x1fffe0, 0x3, 0x80000000, 0x1f, 0x7ff], [0x5de1, 0x8, 0x9, 0xffffffff, 0x2, 0x3, 0x8000, 0x92c1]], [], [{0x0, 0x2291}, {0x2, 0x4, 0x1, 0x1}, {0x5, 0x200, 0x0, 0x0, 0x1, 0x1}, {0x7, 0x4}, {0xdc, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x34, 0x1, 0x1, 0x1}, {0x4, 0x6}, {0x5, 0xf92, 0x1}, {0x81, 0x1, 0x1, 0x1, 0x1}, {0x401, 0x8, 0x1}, {0x2a47, 0x2, 0x1}, {0xfffffffb, 0x4, 0x0, 0x1, 0x0, 0x1}], [], 0x4}) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x2}, 0x2) 10:15:54 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r1, &(0x7f0000000000)='$', 0x1) 10:15:54 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)={0xa2f2, 0x1, 0x4, 0x100000, 0x8, {0x0, 0x2710}, {0x4, 0xa, 0x9, 0x6, 0x0, 0x6, "572ce813"}, 0x1, 0x1, @fd, 0x81, 0x0, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0xf, 0x0, 0x7}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:54 executing program 4: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {{}, {}, {0x3, 0x13, @l2={'eth', 0x3a, 'lo\x00'}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40094}, 0x0) r4 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) r6 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r6, 0x1000008b11, &(0x7f0000000000)) connect$inet6(r6, &(0x7f00000001c0)={0xa, 0x4e24, 0x7, @empty, 0xf569}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, &(0x7f0000000000)=0x7ff, 0x80000000) 10:15:54 executing program 5: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6664bd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000021000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1122.551831][ T27] audit: type=1804 audit(1588155354.736:354): pid=32361 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/899/bus" dev="sda1" ino=15908 res=1 [ 1122.634707][T32364] fuse: Unknown parameter 'fd½0x0000000000000003' 10:15:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:57 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000080)={0xd, 0xc}) 10:15:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000022000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:15:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:15:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000224000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:57 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x29}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$int_out(r2, 0x2, &(0x7f0000000200)) r3 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x1, 0x20000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r3}, 0x10) write$FUSE_STATFS(r3, &(0x7f0000000180)={0x60, 0xfffffffffffffffe, 0x7, {{0x5, 0x2, 0x6, 0x9, 0x8, 0x9, 0x8000, 0x987}}}, 0x60) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) r5 = socket(0x2000000000010, 0x80000000002, 0x0) write(r5, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x65e, 0xff, 0x0, 0x1, 0x4, 0x800, 0x7fc00, 0x2, r6}, &(0x7f0000000280)=0x20) write(r0, &(0x7f0000000000)='$', 0x1) 10:15:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gbyup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1125.332313][T32408] fuse: Unknown parameter 'gbyup_id' 10:15:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000324000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:15:57 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) pipe2$9p(&(0x7f0000000080), 0x80000) write(r0, &(0x7f0000000000)='$', 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff}) bind$isdn(r4, &(0x7f0000001640)={0x22, 0x2, 0x1, 0x80, 0x20}, 0x6) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x40, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x10001}}, {@common=@cache_loose='cache=loose'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x2}}, {@rq={'rq', 0x3d, 0x5}}], [{@fowner_gt={'fowner>', r3}}]}}) 10:15:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67f26f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) mmap$fb(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x67000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1125.516760][T32417] fuse: Unknown parameter 'gòoup_id' 10:16:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:00 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x4f5cc2122c608bd7, 0x0) ftruncate(r1, 0x200004) r2 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r2, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000140)="ee5dbd16824a8f517b0125d051f95b1691671ca20d2339e7245f7645cd88a7ab2e9b6cbbf03aab47c344e08ea6e6bfc071d465cf155d1a5c8aa38539d609b107160b78c5447cdc16059e7da8543b14b79f56e9c2b97a40fe79ecf508de85ea96475de420867c7bec534c6b0ac85abe826d58669f620d425469fd2e9f602188c2f4e5e0a6d986c6b728d93c23175319c9f0a156ee81823317745c11dba79b71ef06c36ea4911e64bd761c062979b299cdc7205c08015988af140d0d5400a22631b3a8b8a250b4325bb91aed3ee4b80ebcbc7623633c94f99fe5791acfcc5af3f892b4f9f1c9f6dbc68aebeb303c43a99a", 0xf0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) chown(&(0x7f0000000640)='./file0\x00', r5, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r9}}]}) chown(&(0x7f0000000240)='./file0\x00', r5, r9) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) bind$packet(0xffffffffffffffff, &(0x7f0000000240), 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB='<\x00'/20, @ANYRES32=0x0, @ANYBLOB="f300000000000000120012000b0001006970766c616e00000400020008000500", @ANYRES32=r10, @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYRESOCT=r7, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRES32=r10, @ANYRESOCT=0x0, @ANYRESHEX, @ANYRES64, @ANYRES64, @ANYRESOCT=r8, @ANYPTR], @ANYRES16, @ANYRES64=r6, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYPTR64, @ANYRESHEX=r3, @ANYPTR, @ANYRES16=r2], @ANYRES64, @ANYPTR=&(0x7f0000000740)=ANY=[@ANYRESDEC=r3, @ANYRESHEX, @ANYPTR, @ANYRES32], @ANYRESHEX, @ANYRESDEC=0x0]], 0x5}, 0x1, 0x0, 0x0, 0x4040040}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf25070000001400040076657468305f746f5f68737200000000140004006272696467655f736c6176655f3100000c009900ff7f00000400000008000100020000007384927e98550561616e3100000000000000000008000300dcd24f935604fe96dfb0abd2ff3aa70d53e528d603ac48463fb0ecef9b2101da1a4fd0dfd96350040000000000000092000272aa3129233131bff4bc65f8619662523564abe02c3f7875de1152cc49d3e7ae9aca2b0ab6", @ANYRES32=r10, @ANYBLOB="080005000d0000000800050003000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x4060001) 10:16:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80142, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:00 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r3, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000040) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) [ 1127.985422][T32435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32435 comm=syz-executor.3 10:16:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000424000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0/file0\x00', 0x60) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1d, 0x1, 0x3}) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:00 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) prctl$PR_SET_FPEMU(0xa, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000140)={0x0, 0x2fcd, 0x5, &(0x7f0000000100)=0x7}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000180)={0xe, 0x1a, 0x17, 0x3, 0x5, 0x10000, 0x4, 0x50, 0x1}) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:00 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f00000001c0)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000540)={0x1, 0x9, 0x7fffffff, 0xb9, &(0x7f00000002c0)=""/185, 0xd4, &(0x7f0000000380)=""/212, 0xba, &(0x7f0000000480)=""/186}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x10400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000000100)={{0x0, 0x0, @reserved="7b538aa23f53d0a94e135f706eb3f1fd76344880c33b4cbf30f8e081b294e0e8"}}) write(r0, &(0x7f0000000000)='$', 0x1) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000080)={0x7, "fb1a0437a163894c97f9fdb4e099bb6f4531aed0809e54502730c25cc68b1145", 0x3}) [ 1128.239702][T32463] Unknown ioctl -1073172847 10:16:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) rt_sigprocmask(0x1, &(0x7f00000000c0)={[0x1]}, &(0x7f0000000100), 0x8) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000180)={'virt_wifi0\x00', 0x1, 0x4d94}) write$6lowpan_control(r0, &(0x7f0000000000)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 10:16:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) mmap$usbfs(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100000b, 0x13, r0, 0x1f) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000524000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:03 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x800) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x1, @broadcast, 'virt_wifi0\x00'}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f0000000380)=0x4) r6 = getpgid(r5) r7 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000180)='rxrpc_s\x00', 0x0, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffff, r7) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r7, 0x36, 0xd0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha3-512-generic\x00'}}, &(0x7f0000000300)="cc96ca30e4d92318c2b5b58322d1c9b6e51d9425d9cc625687124998feff145a519ca0803de28c7c2cb43a42247be600fbf2108a0d89", &(0x7f00000003c0)="381aeea046b331b957ba327db7bb518e481bd85f254cc5d6ebcd35bb7808f5edbbb0f0090f5e62e9d6d4516b3a368f5df212cb7a048b22c1ebe66226ff2c5b7adae70742626938b0645bb190d9073cd705760f61d248f13855e885712df2814909728c7b28733a077352a581533feee9e49a400fd44056cb305f12158d582342a261fc190b9acd1800431ac9055101edcdf0fea98cfa1d10c043e3b656994e97e5ba7b13406fad9331722923b8a9baa65055ff6d877a502ab921e2cff21d91368cdeab97637a8f173be954673f1fd3cf") mq_notify(r4, &(0x7f0000000200)={0x0, 0x36, 0x1, @tid=r6}) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000043e000000000000a4780000000000000200000000000000215c00"], 0x2b) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:16:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x55, 0x65, 0x31, 0x64, 0x64, 0x61, 0x19b90a5e0e87004, 0x32], 0x2d, [0x31, 0x31, 0x63, 0x32], 0x2d, [0x66, 0x30, 0x62, 0x36], 0x2d, [0x39, 0x32, 0x31, 0x31], 0x2d, [0x61, 0x34, 0x36, 0x62, 0x37, 0x31, 0x65, 0x924602e2fbade688]}}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsdef={'smackfsdef'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@permit_directio='permit_directio'}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:03 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) tee(r3, r4, 0xffffffffffff0001, 0x3) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1131.096868][ T27] audit: type=1804 audit(1588155363.277:355): pid=32502 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/903/bus" dev="sda1" ino=16286 res=1 [ 1131.145358][T32506] fuse: Unknown parameter 'dont_measure' [ 1131.167585][T32509] fuse: Unknown parameter 'dont_measure' 10:16:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000624000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:03 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000080)={0x8, 'bond_slave_0\x00', {'batadv_slave_1\x00'}, 0x2}) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000280), 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r4, @ANYBLOB="6ffe00000097932be5718c70c22f056ddc597fd1a62c3c7a1ea72178c91fcd021d9288f1fd38684867215c10c6815e2ea6c1da0cae07ffa6e9a5a64aa5443d47793c037d4165e65945050057de0da3b0c46363c3d27c4660119e3d958194616b7d71258d80424fe176e8b88709f662584e31088f2936cbb283717cdf638c1dd2bbba19809514d56dc27e55e6abf6460ba92810365700342999e962f20be2125ec0b43c26b325d93241a725f562f844c02fb3a6d40acf3771f86c716a526d516ee16da8932a29469d678984b301833a91b9d566914b755b68148a15da8c744275e0d5da89769124d7c52894d50a78b645d42286c000"/257], 0x18}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4028}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x88, r4, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfe}]}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xdd4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x24048840}, 0x10) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726fe800000064653d303030303030303030757365725f69643d000000000000000000000000000000930043b358f6d55ccbde8b19dc0dd60b5d47cede47467e1007f81e33baf23f36ef2c24f084b9f26128c00d488e7d19ab68458546b1e81f540519d491cb7bbc01cdf5e031c6c614a962a0b951f266f08d3acdd327da04fd0f3d4bc89e1befd4d15dc6997a247626fafab9cada06141b85b8c65bd4dab5b21930f7cfcc7749dd5735e9205e1d9c1de80b78a28d276f2b007783d4df", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1131.338952][T32517] fuse: Unknown parameter 'roè' 10:16:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1131.369367][T32523] fuse: Unknown parameter 'roè' 10:16:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000824000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:03 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @local, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000080)={0x93, 0x0, &(0x7f0000000180)="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", {0xb7, 0x5, 0x34324142, 0x0, 0x7, 0x5, 0xa, 0x9}}) write(r0, &(0x7f0000000000)='$', 0x1) [ 1131.553722][T32534] fuse: Bad value for 'user_id' [ 1131.578033][T32538] fuse: Bad value for 'user_id' 10:16:03 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r5}}]}) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x7, {0x2, 0x1, 0x4, 0x9, 0xcb3, 0x1, {0x3, 0x1ff, 0x206, 0x5, 0x6d, 0x264d, 0x5a20, 0x2, 0x59e8, 0x2, 0x4, r3, r5, 0x2, 0x8001}}}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r6, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000924000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x8}}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r6, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000440)={r7, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:06 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, &(0x7f00000001c0)) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="ee7e5ad2c9c26a9fcbc04f3ef93f3cd1af869174ec774cce6c0400000069cf63a29391232e1d7533285db0b9b34c8a77f61a2872da669c049c3c47dc1ca0a8d4144896193d7b4239c80b825e5707c033475b0b024f383ff2c609a928634131131e804e49e020f103f0fb8184dad52e2af522793f6b893a1114631ca42a83c36b40b58e420a4eed2d69c0008c000000000000000000", 0x95}, {&(0x7f00000003c0)="ea682693d9928a53d29c02be0f91cf5af64df0c9178599a902893ad1aa7ced670a23b89c862ea647bd9ea42913f7f5c08623e1586af90dd7f54c5c3f689077a24ec39437c76cc348b0b6ef1cc6045660b725085ac5850d1e816f89a77f15f73ced9c9286d540c59f191d15d2ef65616de276d2e78f8c64d88207dca5", 0x7c}, {&(0x7f0000000440)="cb59dcb713e11e1185458a165746f7c67427601f76a30accbdd959df72dea938053a393353d27d8fb23b3cddd6f5dcd072ffa5e73c638fb874389eb0f3f340b9debdef14e8eecc11fbf755e23d3110e96d5b2e756d26850563146fd40595153655024f9c9d645cb2eab9aaa3", 0x6c}, {&(0x7f00000004c0)="e07b65321f4983b2ec2fc461798ed69a4d39818f3d5c9a0c55fc68e7f35ccb8ea264137f0c7cdad25e390f17e5297c89ee60b1199d79967735f2cef1f3cdbc1765a905ec3a672c8b00b6abfb96bf6b7a8a0ec23447446f8c1fcd81928415b1686f55", 0x62}, {&(0x7f0000000540)="767a96af8b01a05b0b73eb9a9ec50a2e05686d9efed01a6a3274ec03350283f0f76ae424cd416477db4e23628bc237111a49b4e0806420933ff41f27b3b828315b1bd39bdc1274aef043acddeb70cdd76285213cfa1805bed6aaf89493c604730ddc7e0524f359c6586597aefa28546930858725a7f3927079b55de0849e0c56eafe842cb0d127f72036714cbb1de2c0ea5a9dd2d4d03764a4e6ffe599f896e0c0cb82d2e613175b5d4523ec5871805a9124e94ef0cb00a856ab7642224dc9265799154e8fc4736951b4d34ed6ab6e8a0fcb1311500019c10e8cbebb017e3168e6", 0xe1}, {&(0x7f0000000640)="39e3c97278a79145909f276679d3b5c511cb0e183be9ee3ef64e78c3894fbd7a4d3741931074d1e559bd9162bb0904ea8127045f6a9c424690ecb6d4468a0117a0880aeb15af62530e58ba1f7626112be26ce58e8ad243e3e8afa3907b13578cd6ccc05ffbcf6bc1", 0x68}], 0x6, &(0x7f0000000740)=[{0x20, 0x6, 0xfffffe00, "951179289ce79240be69a1ad"}, {0x30, 0x112, 0x0, "1e42082cb5bec6049171fa3bf8bce95fa8afcf37872c22293961552038"}, {0x88, 0x1, 0x40, "1b3c5963f4275aab2eafa9424e1f041fd32beab33d5b350e22f0ed503a1695ecfd59bdbd21dd5d868f7bf49c966454ff1162b21523ab1046e4a7b19a619d41a90421dcb195d17726c0d41e5623c313be501bcfcd430ca222e3875b49db880cabc2bf71e92cc0e48a73459ceed53627bf868cd45d"}, {0x28, 0x112, 0x2, "35f8d9ca0e3c8d673efa990d2ddcf48aa3f7aa892f6bbd"}, {0x20, 0x114, 0x8, "59fb92224b0126c8d7de03a5"}], 0x120}}], 0x1, 0x4) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000240)={0xa0, 0xfffffffffffffff5, 0x5, {{0x1, 0x1, 0x1, 0x100000001, 0x8e, 0xfffffffe, {0x2, 0x5, 0x0, 0x2, 0x0, 0x2, 0x1, 0xa71, 0x2, 0x3, 0x10000, 0x0, 0x0, 0x6, 0x8}}, {0x0, 0x23}}}, 0xa0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x21, @local, 'macvlan1\x00'}}, 0x1e) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x441000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000100)={0x7ff, "e75cec"}, 0x35) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) r5 = socket(0x2000000000010, 0x80000000002, 0x0) write(r5, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r6 = socket(0x2000000000010, 0x80000000002, 0x0) write(r6, &(0x7f0000000080)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) accept4$alg(r6, 0x0, 0x0, 0x800) write(r0, &(0x7f0000000000)='$', 0x1) [ 1134.194554][T32563] encrypted_key: master key parameter is missing [ 1134.285385][T32577] encrypted_key: master key parameter is missing 10:16:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:06 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getsockname$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000a24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:06 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:06 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x0, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) [ 1134.447361][ T27] audit: type=1804 audit(1588155366.627:356): pid=32587 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/904/bus" dev="sda1" ino=16260 res=1 10:16:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000b24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:06 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x3000009) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:06 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x1, @dev, 'ip6_vti0\x00'}}, 0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000c24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000180)={{0x5, 0x3, 0x8, 0xfffffffb, 'syz0\x00', 0x1db4}, 0x1, 0x230, 0xff, r2, 0x8, 0x40, 'syz1\x00', &(0x7f0000000080)=['eth1*-ð1+(eth1vmnet1-\x00', ',\x00', '\x00', '-\x00', 'memory.events\x00', 'memory.events\x00', '^em0\x00', 'ppp1\xe2vmnet0\x1d,\x00'], 0x4d, [], [0x6bac, 0x2, 0x8284, 0x8]}) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000e24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0x2000000000010, 0x3, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000)=0x7fff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f00000001c0)=""/227) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000180)='rxrpc_s\x00', 0x0, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffff, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)='bridge0\x00') 10:16:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000f24000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:09 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000040)={0x6, 0x9, 0x3f, 0x3d2f, 0x6, "ecd80fa017e223bcf124d6987bda021f6a8b70", 0x400, 0x1}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0xfff, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:09 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x80010, 0xffffffffffffffff, 0x3b92d000) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0xd, 0xb, 0x127, &(0x7f00000000c0)}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1137.760645][ T27] audit: type=1804 audit(1588155369.947:357): pid=32665 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/906/bus" dev="sda1" ino=16379 res=1 10:16:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="cd4928640461df5d5c56596c567dbdfcfb03ead3c976ad62021d11edf6050d605db941b6e2e1bd064a8c311720fb4e235a501edf6dc65226e38632b4a92a69b322dd0f2ebe0b2bf4f513e5cb71ca9c7b6ba429999fc701d4630b0f99fc3b1460b7ea2fee472583e7c7bcbe224544ae9a1f5e32943fef2885936d13bba8e2fbaece1515953fea9c8a00006e84ec900e56ed87f2b1f672be", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001124000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1140.290928][T32682] fuse: Unknown parameter 'ÍI(daß]\VYlV}½üûêÓÉv­bíö `]¹A¶âá½JŒ1 ûN#ZPßmÆR&ã†2´©*i³"Ý.¾ +ôõåËqÊœ{k¤)™ŸÇÔc ™ü;`·ê/îG%ƒçǼ¾"ED®š^2”?ï(…“m»¨âû®Î•?꜊' [ 1140.316302][T32683] fuse: Unknown parameter 'ÍI(daß]\VYlV}½üûêÓÉv­bíö `]¹A¶âá½JŒ1 ûN#ZPßmÆR&ã†2´©*i³"Ý.¾ +ôõåËqÊœ{k¤)™ŸÇÔc ™ü;`·ê/îG%ƒçǼ¾"ED®š^2”?ï(…“m»¨âû®Î•?꜊' 10:16:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:12 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x11}, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240), 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="f300000000000000120012000b0001006970766c616e00000400020008000500", @ANYRES32=r2, @ANYBLOB="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"], 0x3c}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="f300000000000000120012000b0001006970766c616e00000400020008000500", @ANYRES32=r7, @ANYBLOB="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"], 0x3c}}, 0x0) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf253100000008005200", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r2, @ANYBLOB="08000100ffffffff08000300", @ANYRES32=r3, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB="000000001ee1ffbaaa8d6a3664d82b90593b9119669b49d3084e9c7e93700179df29c3a54afcd277d129cc88f318d0a7e28f384d5252eabe8521f8d7910977f1ace0e75e5594778f89cb72d51e3b68a5deed14c3045f1ed697746621604b99dc36cb2fefe384fbb62d341630d0ed84220c8e11260ceaf8c8fda7009aa62afe169fa56ec4945d54d298b81acefe6ce6a09f8d34e3d079e7e8965faa0b558f7810bdec7d2d33c6eeeadf50eb6fec51edd370015fa230a6", @ANYRES32=r8, @ANYBLOB='\b\x00R\x00', @ANYRES32=r9, @ANYBLOB="0c0099000600000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x41}, 0x404c004) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRES16=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d0600000000000000fffffffc3030303030362c626c6b73697a653d3078303030303030303030303030303430302c626c6b73097a3078303030303030303030303097b3cc32302c626c6b73697a07000000000000003030303030303030313030302c6d61785f726561643d3078303030303030303030303030303030372c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c0000c1d4fa5e85bcac6163934ce41f371b637d1eadee80f234670000"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001224000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1140.548685][T32693] fuse: Bad value for 'fd' 10:16:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="210132f2128fbb99fa8bdf17b4140712bd52bda8400013eb2e5a149e047c522f644d34c51a54b5fc9c6a6566b60b2842a0658ab0a661e8a570d6818b0090611f137edde6fd899a3bcd10e4c15645a6d22e190488eed0068bc17d2167122e8901a9bafb934db474c2a000b6df75c2a322ef8afd09fb4b69e4399b51e3d7d2a695bd0f7955196a80aecf84469d5e33e8b566d86a838b82b348fa285c20ea42b1153ce3c7d7b434918e295c4cfc137ce5b5bdf90df61d5b94e57ce930129abe68e66594a619ef37b7b8de9a908894192f6f60c9d75c7248151b565484c8e463a4c571eee68e4f28881830aca9269154ae4061448892892ae418611e4cbb17ca2b9ba6346dcac8b8960a0ca927ecde2f1d5924df3e3c85cd221573688762c86079b1489c317a7070e0c4694d937974b573142e30a9548f3c9e966cac552ffeba06166c288ab9d58f986b6ef45476212e7e065780be5d94d6076c78b8dd17a8e8a34e99f1caf94157", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1140.590149][T32693] fuse: Bad value for 'fd' 10:16:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001324000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:12 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) sendfile(r2, r1, &(0x7f0000000040)=0x8006, 0x80000003) [ 1140.705322][T32705] fuse: Unknown parameter '!2ò»™ú‹ß´½R½¨@' 10:16:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000000c0)={0x7, 0x1, 0x4, 0xc0000009, 0xfffffff9, {r1, r2/1000+10000}, {0x5, 0x8, 0x9c, 0x3, 0x8, 0x3f, "30157518"}, 0xffffffff, 0x2, @userptr=0x7, 0xe36, 0x0, 0xffffffffffffffff}) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000180)={0x2, 0x120, [0xff, 0xc089, 0x3, 0x0, 0x7fff], 0xff}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='.\x00']) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='fuse\x00', r3}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x480002, 0x17a) [ 1140.758640][T32710] fuse: Unknown parameter '!2ò»™ú‹ß´½R½¨@' [ 1140.818720][ T27] audit: type=1804 audit(1588155372.998:358): pid=32711 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/907/bus" dev="sda1" ino=16379 res=1 10:16:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000001424000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1140.972011][ T27] audit: type=1804 audit(1588155373.158:359): pid=32716 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/907/bus" dev="sda1" ino=16379 res=1 [ 1141.059816][ T27] audit: type=1800 audit(1588155373.238:360): pid=32711 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16379 res=0 [ 1141.114977][ T27] audit: type=1800 audit(1588155373.238:361): pid=32716 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16379 res=0 10:16:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000006024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000)={0x3, "df5415"}, 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:15 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x15, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f0000000080)) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:15 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) pidfd_getfd(r2, r0, 0x0) ftruncate(r1, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f00000004c0)={0x16, 0x12, &(0x7f00000000c0)="5a7ef8ead21869bacf54c5ee82f876453ad21c5bdf58b3c30a7afd2561a41f30440ac79b8ff22accd14025250b08abbb41dcf8cc85653102f146aaf4e428c3251bd88fa39c2bfc5b8889f871b59b8b8e21e98ed10bef351fef27d3233a8f2a48c6318e7b646c13f168a01dcd69473338cd3bff56d39ac8d9f0ce51cc5bfc850b1702527781e965c8793d0dc000e0c34eb14d8738cd5f677262ce5410c7b2f4bd9ef186865ad63c4931834a22933b830eeb1ee35be9db75d270b4cd8b4a6243a5d1ffd3cf48f2c6bc9ee13b9e4b799d5eb0fe6451193dfeef49c128bb57ceec3cb761009e13bb2e975f0973260c3915d6122f697d9967590e8ee1eb2aa67ccdced6dece6d87a3f165860c2621301d09a4da1b199107bc9f9e57414cdc524009808b3b6edc97327efe7216a5983219008474a5437554f1699ea2c2b0dc6ce3adcacc94d1a83b691bda0425d25442b35ce25f8042786a03c0018be48223c17441cf1de4cf183b1b7701197e43a121c16a567f8051b9eb8982b5416510748a15dc8d052a0ceed6425bf5c0bb23d2a8bbd5f92f6bd4f61280cb13fb9e50baf291c0508e4351c9816344afa4d179e8fd9313dca19c321f2fd92269dafd6b2e78c184ac700fd23fe8dda3fb38014b7f02e40c48d9e79bf8186ad6d8056b438158e0fa8c102d4396cc8ddace9f98f2840127b73e0ba2d9750838939ff6165d98a643f78fa9773db17704997ee934a74b1f7c5e8eab9f8c92db6499177f1141bd259177e70399b8fb38efd01f403722107aab50051deede9a539dd31f627e8dddbbbd908226308b3e172fe0b20fef5ec838aa52deb6d2961f4cb6eacc1018b297f24ecab660586b1590d4bd8f5551d3041c38b97ca23a40af71efde817c16a3a44641f2ae60461ce1ac155554f5668b1c7d35d01e6afdf6915308444d3c6aaf08fa6ce0f1d2bf0e71210edb539cf40f05557d20e23a1d145db9b68234d678f4b37828dcda0d2f17968b43ca8b09f8cbd576acfa51e87065a6dab1b793ca89cda77c88f0244a2b5f1ce27e335016132c43611c2eabda986510f633003c9cf4a9b936f6e4562f9228334c4582c4234139f0d32951e2ae8cd2278dedd60a33b7bff1ad6321308e7e6fd585a22137f9baaf8c37c3f027e667ead23836df1ae068f27ade67e708671d8cf15582353229d6a59a16d194a2b18fad24a6703e6e94fb1a0544067829bd85401ec23e1b70d93739e3b5fcf3a5d279ea73d1307214d0a22e264526b845b81016d7e1efed519821afd6bd47c56653a4bc70d316b4f816a643f7ff2aff9cb33ca632fb6fe249720fbff2bc574e407114377974e10f67371f18d179974d3ec70a36507831b89cb21a1a1674e27f5b5a5fe9031f0ef90cf0196c55ea5239007bf45e3ce835a6784fed5b766251821f8f1f22719cad922eee66cd1ed5226cbd"}) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000500), &(0x7f0000000540)=0x4) 10:16:15 executing program 5: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x1406, 0x0, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x44000}, 0x24040001) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c3f5dd4748e1bc2a6c128780e7161e0c5445fbc628da8080aa79c15d85803bd4b61482eac6f83e2811b0d27446beae71af3e99f0adc730e599c8e3b528f5356264d1e0817c769716d4bf5b553de540fef5a906bc6ebad4801eea65fc7f840fc0a1f049db9bd7ba5879cd048cb4151b09b7f62be3b28da748e69d8d81fdf5abce0e3c8e353c5b4efaf52a2963af9e8b3a9049", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000073000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1143.631924][T32753] fuse: Unknown parameter 'ÃõÝGHá¼*l‡€ç TEûÆ(Ú€€ªyÁ]…€;Ô¶‚êÆø>(°ÒtF¾®q¯>™ð­Ç0å™Èãµ(õ5bdÑà|v—Ô¿[U' [ 1143.639637][T32756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=32756 comm=syz-executor.1 10:16:15 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mq_open(&(0x7f0000000080)='em0)^\x00', 0x40, 0x2, &(0x7f00000000c0)={0x200, 0x400, 0x3ff, 0x6}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000100)='$', 0x1) [ 1143.712168][T32753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32753 comm=syz-executor.5 10:16:15 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000040)='./bus/file0\x00', 0x141040, 0x0) ftruncate(r1, 0x200004) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000140)={0x0, 0x7, 0x4, 0x80000000, 0x8, {}, {0x1, 0x2, 0x5, 0x1, 0x81, 0x3, "746e7ca2"}, 0x7ff, 0x4, @planes=&(0x7f0000000100)={0x7fff, 0x5, @fd=r1}, 0x56}) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7ff, 0x80000000) mkdir(&(0x7f00000001c0)='./bus/file0\x00', 0xa8) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./bus/file0\x00', r1}, 0x10) 10:16:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='dd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) quotactl(0x0, &(0x7f0000000000)='./file0/file1\x00', r2, &(0x7f0000000180)="6a32dd1d94678d034eed5d040bc0301e98e438345494a9b7ad46a8e7572282027fa2d313e92aace5cb33a0f3f5a9a7935b54c2614e3408d8874362c28de706a3570ba01cd8e1541392b474b7c9130518aca2809580b988683b1ce05de8902bcc493a6c7c2923fa9c3843552694bc187c6dbdcef3b1d793f3599d80b0daefbf3dd9a3d1eeaa79788a13e8bdee2a194cf2fa8ebba5f5da8d740f77aebafd949e3dfb323b884a7dc126bb870ba191063ff6b3437eb34ee35e071bb1ebd371b9a46219a0e64436fd5a86aceac40316807a83ecdcf409c68ceb5a9088c60b54afa9776417a83b2f669e8d916c03fd84af55d39daff37417") open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1143.795184][T32756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=32756 comm=syz-executor.1 10:16:16 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000ec0000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1143.944847][ T309] fuse: Unknown parameter 'dd' 10:16:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) rt_sigreturn() [ 1143.966408][ T310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=192 sclass=netlink_route_socket pid=310 comm=syz-executor.1 [ 1144.072685][ T310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=192 sclass=netlink_route_socket pid=310 comm=syz-executor.1 10:16:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:18 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x101002, 0x0) getpeername$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c) sendfile(r0, r1, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:18 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x1, @empty, 'ip6gre0\x00'}}, 0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) r4 = dup2(0xffffffffffffffff, r3) setsockopt$ax25_SO_BINDTODEVICE(r4, 0x101, 0x19, &(0x7f0000000080)=@netrom={'nr', 0x0}, 0x10) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1800) write(r0, &(0x7f0000000000)='$', 0x1) [ 1146.377089][ T27] audit: type=1804 audit(1588155378.558:362): pid=331 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/910/bus" dev="sda1" ino=16382 res=1 10:16:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000100)=0x0) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r5}}]}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x804400, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@obj_type={'obj_type', 0x3d, 'fuse\x00'}}, {@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fd'}}, {@uid_gt={'uid>', r7}}, {@smackfsdef={'smackfsdef', 0x3d, ',self#$wlan0'}}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<', r9}}, {@measure='measure'}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000003ff000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:18 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x7, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x88000}, 0x20048004) [ 1146.703290][ T27] audit: type=1804 audit(1588155378.888:363): pid=348 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/910/bus" dev="sda1" ino=16382 res=1 [ 1146.705033][ T345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=255 sclass=netlink_route_socket pid=345 comm=syz-executor.1 10:16:19 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x401, 0x20ca40) write$FUSE_IOCTL(r2, &(0x7f00000000c0)={0x20, 0x0, 0x5, {0x7, 0x4, 0x6, 0x3}}, 0x20) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000080)=0x2) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @aes128, 0x0, [], "05a6580debe076fb7548430373af4088"}) write(r1, &(0x7f0000000000)='$', 0x1) [ 1146.790810][ T27] audit: type=1800 audit(1588155378.938:364): pid=331 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16382 res=0 [ 1146.836677][ T27] audit: type=1800 audit(1588155378.938:365): pid=348 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16382 res=0 10:16:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400480, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) [ 1146.898934][ T345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=255 sclass=netlink_route_socket pid=345 comm=syz-executor.1 10:16:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000000f000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:19 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "8221aa9ada"}, @NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "394a4e49d1bc6ef2faef1f3e83"}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, 'dW^eP'}, @NL80211_ATTR_KEY_SEQ={0x14, 0xa, "8c87478f0f178a1a327a55433fc0a3d3"}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x10012, r1, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00'}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r6}}, 0x48) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r8}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r6, 0x3}}, 0x18) write(r0, &(0x7f0000000000)='4', 0x1) [ 1147.054833][ T27] audit: type=1804 audit(1588155379.238:366): pid=374 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/911/bus" dev="sda1" ino=16242 res=1 [ 1147.125491][ T380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=380 comm=syz-executor.1 [ 1147.143905][ T378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=378 comm=syz-executor.3 [ 1147.188831][ T380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=380 comm=syz-executor.1 10:16:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:16:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f00000001c0)="240300001a0025f00034009300edfc0e80031b000000af00000000000800010048050006eb69efde8a8cf74d25a70500000000000000f9790bddcbbdfb8f2366f113255800000000000000006472", 0x4e) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x4) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1149.413686][ T403] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1149.496064][ T403] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:16:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:21 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={r5}, 0x9c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xaa, "11523f0e1168dbb7ee5ad7a98706c18c0c75e671e5ccb18e336868ef623633a1e11e38a0687b1566a4195ab26d9a3585f75ecac983b0fe11608c5349e58324426db8dbac0a43225ae11c1e6e0650339c481beae4bdd9cdfd0ad0dddc78deb9cd929bc7a95bbfb7d77ff470eed5bf31d21d567796fc9fd534a28c9f48b259bdf3607b6069722223b26d9da4f2e13afc2784f8b4f64a3e2e1fede9802184560503d54294766f84fc5795e5"}, &(0x7f0000000300)=0xb2) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r6, 0x7}, 0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r7, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(r7, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x4c, r8, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0xb}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc000) 10:16:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:16:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='Md=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1149.800838][ T425] fuse: Unknown parameter 'Md' [ 1149.826653][ T430] fuse: Unknown parameter 'Md' 10:16:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:16:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000011000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) dup(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000180)={0x19, 0xb, 0x4, 0x0, 0x3ff, {0x77359400}, {0x3, 0x0, 0xf7, 0x7f, 0x1, 0x9, "c23492c1"}, 0xffff, 0x2, @planes=&(0x7f00000000c0)={0x2, 0x1e, @mem_offset=0x5, 0xab6}, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000100)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0xf0, 0x9) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x4, 0x591000) 10:16:22 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r2 = socket(0x2000000000010, 0x80000000002, 0x0) timerfd_gettime(r1, &(0x7f00000001c0)) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) fsync(r3) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r4, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x141a, 0x3f, 0x8000}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r5, 0x3}, 0x8) 10:16:22 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000040)) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r7}}]}) fchownat(r3, &(0x7f00000000c0)='./bus\x00', r5, r7, 0x800) 10:16:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1150.020874][ T443] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1150.064203][ T443] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:16:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@dont_appraise='dont_appraise'}, {@hash='hash'}, {@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, '\'lo'}}, {@obj_role={'obj_role', 0x3d, '/dev/fuse\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_user={'subj_user', 0x3d, 'group_id'}}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_lt={'euid<', r2}}]}}) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1150.141581][ T27] audit: type=1804 audit(1588155382.328:367): pid=452 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/912/bus" dev="sda1" ino=16237 res=1 [ 1150.304166][ T467] fuse: Unknown parameter 'dont_appraise' [ 1150.314985][ T468] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1150.327456][ T467] fuse: Unknown parameter 'dont_appraise' [ 1150.382119][ T468] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:16:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:24 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x4, 0xeb) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:24 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x30, 0x1, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}, 0x6}}}, 0xa0) mount$fuse(0x0, &(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6775ef7bd15f69643daf6aca6cf015e2a6e56af6c893b9bd9591e278d64c6fe8926a1553da241db3e5c5fafe59febe2c80e6db9ee5877058fe850605a3863ec694a2e22d6b8dcb4c8546baa63f6fb276ed6143d06272dfc024f55617940ae65dc1df83f2f3959168662d524152ba3b979f2b65a9035cc19bebdbc6e375a67af2db67dd8a3d3c754765fa02243033ba060c0e61be43d396171b2fc8508fb6ab260b95a67cc7e8ca010000808205ec546db5fb9fc9918913be946a94579d10fbfeac6a2c0d134770c72d81570eb71da21bc22503b170cf0a625fe7eb1123831b3792644e29657c8d795ca2eeafaa571e97239d000514d16526e42c42e5ec143398507dcc2c470de9cf79f3b287ece0ccdcec8269d86b7b7620dcd4f757a0178638", @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000000000008000,max_read=0x0000000000000001,default_permissions,\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000013000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:25 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpgrp(0x0) clone3(&(0x7f0000000240)={0x10000380, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x26}, &(0x7f0000000180)=""/64, 0x40, &(0x7f00000001c0)=""/43, &(0x7f0000000200)=[r2, r3], 0x2}, 0x50) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) [ 1152.848967][ T485] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 10:16:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f29643d8081255c507e9f002ae90d87a41f9dd8c7e86d02ac365037648bf0d3ddb8abebed2666d6797cd385357850af1f6b6f169dfce5ed553204f446e6cb0f4d9b154c06a9155e128bf0b9eefa7b909f72a0877461669de74938b9262021358e4968ec8eb92a84995c610571324738981efd08e2d4f25067bfcb7b7ebe7677c670f62e4192b252aad5ed0722dd6bfdf23989d6ec0c9dcb2c12652267ebd526f64bdfacd5bfa3e15a4df0ff0baa49510d564ba7bdc5a4a5e1c9e1b40cc420d5482472178c", @ANYRESDEC=0x0, @ANYBLOB="2c000db0c5b910812d579742a853333c324f4d3821dbf9c75200b23630bce4caa25afc7bca2de363cae2fe0b1942ff7939d914766cd858494371d112e55f05e25d9a1bee96f88da1faa06e88c3"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) recvmsg$can_j1939(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/19, 0x13}], 0x1, &(0x7f0000000100)=""/58, 0x3a}, 0x10100) [ 1152.915716][ T27] audit: type=1800 audit(1588155385.099:368): pid=488 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16076 res=0 10:16:25 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x10, 0x3, 0x8}}, 0x14) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1152.968718][ T485] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1152.979168][ T499] fuse: Unknown parameter 'group_)d' [ 1153.016650][ T503] fuse: Unknown parameter 'group_)d' 10:16:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB="489a1e42d8181bce643da02a64a5e686dde14dc7a250b4155ccf83ecb98c7a9f638b82d75f37bbe8b9ab2669fc1f635744e64ff56cd83c488cb1d5eda513546416bd2cbeadf9df2d082bdd459046dbe9d41bce727c34a454e28b9b11db2eee328bc8abb1de5ec0783216d1ca8fbf5333bb34f120", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:16:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000014000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7f726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1153.119950][ T27] audit: type=1804 audit(1588155385.309:369): pid=506 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/914/bus" dev="sda1" ino=15830 res=1 [ 1153.247619][ T515] fuse: Unknown parameter 'roup_id' 10:16:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d2c29d5f75ed23ecef97b683c74b90781d492ff29781665f739f3cd644b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000015000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:28 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) getsockopt(r1, 0xffffffff, 0x67, &(0x7f0000000080)=""/121, &(0x7f0000000100)=0x79) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="240000000000000000003d0a7e1792a0500905", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1155.876602][ T531] fuse: Bad value for 'fd' [ 1155.896331][ T534] fuse: Bad value for 'fd' 10:16:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000016000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:28 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000080)={0x7, 'syz_tun\x00', {0x1}, 0x6}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:28 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x62) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1156.082632][ T546] fuse: Bad value for 'user_id' 10:16:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000000c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f9eabdf4574a1e4068c75915e75705f69647d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1156.136745][ T550] fuse: Bad value for 'user_id' [ 1156.176435][ T27] audit: type=1804 audit(1588155388.359:370): pid=555 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/915/bus" dev="sda1" ino=16197 res=1 10:16:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000018000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1156.312854][ T27] audit: type=1804 audit(1588155388.479:371): pid=560 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/915/bus" dev="sda1" ino=16197 res=1 10:16:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000001300)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x1d0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'veth1_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x307) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1156.493637][ T27] audit: type=1800 audit(1588155388.549:372): pid=555 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16197 res=0 [ 1156.513722][ T574] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead [ 1156.546909][ T574] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 1156.600473][ T27] audit: type=1800 audit(1588155388.549:373): pid=560 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16197 res=0 10:16:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:31 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) connect$pppoe(r4, &(0x7f0000000100)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'ipvlan0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) splice(r2, &(0x7f0000000080)=0xff, r3, &(0x7f00000000c0)=0x80000001, 0x100000001, 0x2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 10:16:31 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x72b9c0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x4) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000019000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r2}}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f0000000380)={0x9c0000, 0x5, 0x200, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x9a0911, 0x800, [], @value=0x8}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r6, 0x0) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r7, &(0x7f000000d180), 0x4000000000000eb, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x100000, &(0x7f0000000480)=ANY=[@ANYBLOB="941411", @ANYRESDEC, @ANYRESOCT=r3, @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="ebc2bcbd41b2e40a802b926e4b7e521fda7b185ed310108eb2e45e7514a5593687bd6e2120fd5381b41f12157531290d5ab53300"/61]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1158.958175][ T27] audit: type=1804 audit(1588155391.149:374): pid=594 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/916/bus" dev="sda1" ino=16310 res=1 10:16:31 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000040)='./bus\x00', r2, &(0x7f0000000100)='./bus\x00', 0x1c00) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1159.031855][ T27] audit: type=1804 audit(1588155391.149:375): pid=597 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/916/bus" dev="sda1" ino=16310 res=1 10:16:31 executing program 3: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"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"}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @empty, 'vxcan1\x00'}}, 0xffffff93) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000000, 0x10012, r3, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(0xffffffffffffffff, 0xc02464bb, &(0x7f0000000200)={0x1, 0x1, 0x42, 0x3, 0x1ff, 0x1, 0x7ff, 0x9, 0xbc4a}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000240)={0x8, 0x9, 0x49f7, 0x0, 0x4, 0x2}) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r5, &(0x7f000000d180), 0x4000000000000eb, 0x0) write(r5, &(0x7f0000000000)="d7", 0x1) 10:16:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1159.128817][ T27] audit: type=1800 audit(1588155391.189:376): pid=594 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16310 res=0 10:16:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f428dab1ef2e76ab55a63b0a7376211d566a6ae27ea6720095982ba5ec7c45f1407c423c200858ab4626bd95cad0f66118001ab9acfaef468d1d1f000e3c9dcd9e91c490b00c4c51e21223a99bf3eec77f287a2ca80f487f0088fd85abeecd8d3da2ac72db6bc21dd10003175ea7b8b3151f7518a88539d8482c3f7e4de2a0694b292213dcd1293208008a5f533006f71752da4d0c32ceeb0b0c930ef691a3963e6da2ef4b138e18d18c74563e436cfaaf1597e8418b02c71d7bca07649dac9df5465ec1c6eeffdb5587a606a9be74007152dde97facd809e657514c2a6d991d2d9f700000000000"]) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) syncfs(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1159.201825][ T27] audit: type=1800 audit(1588155391.189:377): pid=597 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16310 res=0 [ 1159.262240][ T27] audit: type=1804 audit(1588155391.349:378): pid=613 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/917/bus" dev="sda1" ino=16262 res=1 [ 1159.323742][ T624] fuse: Bad value for 'group_id' [ 1159.407080][ T629] fuse: Bad value for 'group_id' 10:16:31 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:31 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000180)={0x4, 0x123, 0x7, 0x8, 0x9e6f}) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000080)="24ea868edb80b38bf30d93594336cb82f5741d0eb57f6c5793902f4fb65edd202db75f8602a3fd10de9c73ab74dbd7146d83a83f7aa9227bd5a5cad595dcc6a36da19228c55fdfe947c76b0152025c099e4c76513ac09ad7d86f201e8a7ce9f1ccadb38ef7c3ba", 0xffffff47) recvfrom$unix(r2, &(0x7f0000000200)=""/219, 0xdb, 0x1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) 10:16:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001c000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1159.547627][ T637] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1159.571445][ T640] ptrace attach of "/root/syz-executor.2"[638] was attempted by "/root/syz-executor.2"[640] [ 1159.643215][ T637] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 10:16:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:34 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev, 'bridge0\x00'}}, 0x1e) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {{}, {}, {0x3, 0x13, @l2={'eth', 0x3a, 'lo\x00'}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x400c0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f00000002c0)=0x7a87, 0x4) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x140c, 0x200, 0x70bd2a, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_CQN={0x8}, @RDMA_NLDEV_ATTR_RES_CQN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4008840) sysfs$2(0x2, 0x2, &(0x7f0000000300)=""/40) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) write(r0, &(0x7f0000000000)='$', 0x1) 10:16:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001d000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) r1 = msgget$private(0x0, 0x28) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000440)=""/25) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000180)=""/180) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6de5"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x311c30, 0x0) 10:16:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000001300)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x1d0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'veth1_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x307) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1162.096033][ T657] fuse: Bad value for 'group_id' [ 1162.159588][ T666] fuse: Bad value for 'group_id' 10:16:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001e000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) read$dsp(r1, &(0x7f0000000180)=""/148, 0x94) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f747e6f64653d30303030303030303030303030303030303034303030302c750565725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\"']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:34 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) sendfile(r3, r1, &(0x7f0000000180)=0x2, 0x1) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)=0x10001) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f00000000c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 1162.297381][ T675] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1162.308891][ T671] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead [ 1162.327314][ T671] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 10:16:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000001300)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x1d0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'veth1_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x307) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1162.349692][ T27] audit: type=1804 audit(1588155394.539:379): pid=679 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/918/bus" dev="sda1" ino=16382 res=1 [ 1162.404503][ T675] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 10:16:34 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000021000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1fa9, 0x18001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f00000000c0)='*mime_typeppp1[]usertrusted\x00', &(0x7f0000000100)='./file0/file0\x00', r2) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="097ad83bc360fdeb2632", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r6, 0x5dde, 0x8000}, &(0x7f00000001c0)=0x8) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1162.574851][ T27] audit: type=1804 audit(1588155394.759:380): pid=679 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/918/bus" dev="sda1" ino=16382 res=1 [ 1162.606760][ T692] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 1162.693392][ T704] ptrace attach of "/root/syz-executor.2"[703] was attempted by "/root/syz-executor.2"[704] 10:16:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x8}}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r6, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000440)={r7, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:37 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x80f0, 0x100) 10:16:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000022000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1165.144121][ T27] audit: type=1804 audit(1588155397.330:381): pid=720 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/919/bus" dev="sda1" ino=16256 res=1 10:16:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x8}}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r6, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000440)={r7, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1165.244249][ T723] encrypted_key: master key parameter is missing 10:16:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000073000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x28000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r4 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="11000f000000000000000200000008000300b737b7b275b91c097961810748a459655ea3ef5b6acef25670f713aaedc8538b1f1290b02668c73cd6a9b9326b2ebd2cf29a0bddb65b68fa6b51b6302aedc2e4f163a5541298eef8f5b2009eb85a1c1d671413491e6d6eea574cf1bae2c598c4a1da892f16ab68e053904d", @ANYRES32=r5, @ANYBLOB='\b\x00@\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002dbd7000fcdbdf05110000000600b5000400000006001401ff070000f60b50f0a66e9cfabde4a1c5d6241d213272e1497fc113629df4704642a15c2f15800f51f06aa3a2f697a1ef05113df8798d78b35dc829e654917516d8fa1afa4a4ca33d10f1696157b8889424d09a79421b74d881"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4048886) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000180)={0x5, 0x9}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',croup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = socket(0x2000000000010, 0x80000000002, 0x0) write(r7, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) sendmsg$AUDIT_SET(r7, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x3e9, 0x300, 0x70bd27, 0x25dfdbff, {0x46, 0x0, 0x2, r8, 0x800, 0x401, 0x1, 0x0, 0x8}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000050}, 0xc0) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1165.318116][ T27] audit: type=1804 audit(1588155397.420:382): pid=728 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/919/bus" dev="sda1" ino=16256 res=1 10:16:37 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x7) [ 1165.461680][ T748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=748 comm=syz-executor.1 [ 1165.487246][ T745] encrypted_key: master key parameter is missing [ 1165.528972][ T27] audit: type=1804 audit(1588155397.720:383): pid=754 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/920/bus" dev="sda1" ino=16237 res=1 [ 1165.566272][ T748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=748 comm=syz-executor.1 10:16:37 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000c00e0bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2000000000010, 0x80000000002, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000380)={0x6, 0xe, 0x4, 0x8, 0x2, {0x77359400}, {0x5, 0xc, 0x81, 0x1, 0x2, 0xa0, "fded6283"}, 0x6b, 0x3, @userptr=0xff, 0x80000001, 0x0, r1}) sendto$inet6(r2, &(0x7f0000000280)="35e4f1660adca947607de84684b063d738400a5ad7f2114139b978c302693260dce86fafa9bea0dfafb1b249de89a80a2627", 0x32, 0x4000805, &(0x7f0000000500)={0xa, 0x4e20, 0x20, @empty, 0x8c1}, 0x1c) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket$nl_generic(0x10, 0x3, 0x10) getrusage(0x0, &(0x7f0000000440)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1c, 0x27}}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x2c}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x88, r4, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6523172d}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x26a}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010102}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x531}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4001}, 0x20000084) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1165.729872][ T764] ptrace attach of "/root/syz-executor.2"[763] was attempted by "/root/syz-executor.2"[764] [ 1165.738187][ T765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3776 sclass=netlink_route_socket pid=765 comm=syz-executor.1 [ 1165.827626][ T765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3776 sclass=netlink_route_socket pid=765 comm=syz-executor.1 10:16:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000d=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240005b4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x8}}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r6, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000440)={r7, 0x1000, "821d191d8e1439eb4b124d5851c4a8ab7ea158b4131d1a78141c027bb5db40d311ccd62a6ff0361cc052f902dd6f1e00f880c97700f633063fd33f32b2f523cd72f327e69effbd996440881005b2956973ff133bc3f44f527e6a699a0bf3f1d751e76d8dffb8cb49552b07c352e1cd31bf61b2599b2a153cbe4deadddda453fac444a984017e87aa681f130c109c1c0d9828818284bd28ad7540477132ecddc461959360a77491d9cf71592dcd71cb13cbed7a6f03f41270ba83c857584887e575a0f6ce24fd9983e28f8dc52e94715ad1910238f97a00f8041536dc28019eaac8a58762f6ff07b091d52d08dc69bab55db9d46a57a88ce0933e655b4f9cc27ea2f6958f3fd5132c520fdf84032260b930348d4be9daecc0770b5bb55de7b69a2de022223f64c504e3b35c8bba0adcb1c0fb0b3ff4eca8de27e9a41aef32b860de4277e9dd1bfd1d31ac5c02dfb682de0218f1544af20551081e3bb5c379629706a16fb8ba4fe3856095fbf753972951e65abf26a5b0acb7f0b5fc57041f7f092d658cd7513c38f99144355dd115173083c3dab2ba9e5f013b93a6fceeb44822f4509839dd874cb742ccc3ceb651b78f347561e1bc30470dbba64e1c61aeb2e83e7bcb257cec8cea6c9cb097f059ececfd29fdf0524eae61256112d2f62eb68b9aac0e87295cad67814b343c667fd4103ccde1092e52d74cd8af3eb50cc78fdbb7e5da569e5197aff41a6914f799e5fee856b0341e82c36f572e28e676bb91f7efd60785045583ecfcfe496e4e9aba09278f3ddd16ef51fb16154f13211f7e7c2de2f1f7b050910a2d2f48654a93d7f704ba30b5461b1ad3891719640fddb705fc1b357f6984de516356768d796c25e0385e5683d6d5c7f7a16310b0d3936a3b1ebc852f17dccd6c09eab7d9c62320788af6dc8dce854377cdd076e852f5e28924aaa978b27738c442c3a3acaf831ebc22088b5b2d2dd9ca22ac67cfc2a8290876a103609a87799c39c26aa0fd2fdf714af1d4675092294a38567a8e3c4354b131a7aeff6edaf91681386d226f123c4fb31c2f9244520922a7c8bc6729434436a5cf2d887dbf2ca7bd32dc0c27d7da5ac83155dd4bb1c25233bd72c25c7e7f5b9edf25d531b805a6fee4f3567ae7156289f20e01ff054d870133db7170ed4583aeaef133dd1e9fe2d1441d2b7ddcd5db35014c48a03c302449928a97020c1279ee9949708b5a476de3699b1d877097e8398a671f5a5544555dbf0bd475300653c15b8196e79cd9abaafeeecbbbaf442b3629fb7a1bc0baf456ad04a60c7f83ffba02dfbaa8cca2742329d3569fd5d4e4a115fff46ab8c840e27e796726121b245e91c146aa10b23a5f1ea4ba66ebf90f6336c8a811463f6a5135196ec07d380dd6d7c825a3888bbb8e6eb44ba35374d7740b59689ecedb34a928355cd6b835309f4c550d1a910a4cef6a9773b9e1d378ac07b0eab9c5cce74d0c4e3ebad9c018d69457d2cad79c2eeee455621c496b7c859ccf7723df192b0711b7ea853172b00f977a385dac6ccfd3366f41f145fd815190b81f86b56a77920ffa2af20cb78dc00f58ea9a37ec253fb2a78231e80afbd09ece67f34ec99f9b0b4f11d8186787be410f6c74dd414153a62e596e30392ee2fe3997853997f0c0fa110feb392c710d2720abcaaccbe7239e134e3ae47688b9ebb726d5c39f2c8b3d8ee23457dad0ffd794687848092b97590bf3d34bf25382b415971c7208549d70cf774dd02618cce965e084deb34954090fe092e0f5c303b36496abe7ff588c0557074185dc98821e840be0d6921ef84dd4e5e0f57457382ba7833af45b2cf8563a5a1be2e9491aaf684b72326206aab7ac4c6d9a4a0a09aafca864f322d485697291a670fb9d23349b3d511cf59b63743326fcc18026cd3e2abf8a67cf14978f9d9985357ba3507f1835dfb25c28aa6f1c2102cd6780bf16eda49b5d891fe3b1750300b043a9daf673ff20f9f4c8838f61caf9ee7af079cc420e71c26443742f179e47b3b3e8ddd33116b5251c6935de268eecc11461735970c0e8fbd1147aae36165b4c5e6522025b42801d318295275a1553cb3f145a67f6efbebd9e66eba22d8123d99eb4ae034bfd33f61db2528c3c8a2692fc5c41c86381a03ed209f758b01b6016e0b0c5e36d0d634d5b23825f5bf6dc156a7ead8212efc3a817749c71b4faf7fb19d2e9f9725194ed2ebb4a9c11a04515f24d80e3577991b19db43bc4266cc9a6a721e1d2d09f30f0aeb04239b515e41a4870a87d9c3a0b2d519fc399d00adf31f12072234c445094b3be7e2f03577a58ad27aa0169d2faac9aa934f8add6fac2e63d1516e8b77c378c78033814914c6c2cc845a96d97df3924fcd93a79e7fb6c9e8a87f4059fbbde913779e47008e44435047895f3b8cb209dae782f08189ba44ed571cb440af8d42110c7213167fe66482e03f06a4f9149bccd8ee439322eba52fd5569d36bccfffff20c19fc9cb15d0881b2e79ad037cbe6ddad649b28c35303098461742e2e6b26f6a80aa7eaffd79e999b7c0943d00279e76011428f4db7e56a5642eb8b38cdd4aecda8658846e94f9b87fe918ec49c42cc2c19135e716c2dbf37e6c3dc5744fbf1bd4ba4b84dbe69aad445697b8730493ab59940f69bc1b2cb8e2d887d109d4b49ed987eb1ff53892a4c1aa68738acc1ac15b8891e3964a2c8d6134cdb045cb24461e1441b7045ccf0e811bf4daa9e0c11e176c9bb02480950fce0e6bfb4d5d588700c6176a87b936cc8b1b38f068af229c7177df63d5fe8858390cbd36b2848471d95500ae602240eeb5e70e06881f404c23c253217410f222477f08a4886123f5cf0ae3221a9abccca9778452e3043732123b843506545e555e4fe50f553341bbbd3f388ead8b47763f4225c2aff80a1a5de2003375d3cc09cf7bf896001850f0ebb27955b8dcc40d14d31a948d633bf51fb298961e59dfd9ed3fbc484e14f955869a43af06dc86e879a67641a2a4ef2496e6605ce2d6f2e8d4253ccc9e254cb9911901d0b0540604da11c4c252812e7bba29376ac18267224be6b3b7467670c482659cf332cb122ab2e8cde8da210ee08884d0ec21866adc2b8b1ef3d594f4f4b968caed54bb8b2cd991bf2ed05759822411640a89a9c058f15f60424b9497159ca6ef74feb879387ed62c57f05d27d40cb6b4acccc3f3a25d416ec18f4faf73cd7ce729e440a54cc920fcfc46d82eb7ad6d7aa9fc03333c0cf363424c068bd58922c9c888569bd7b489cca709202ad4ac4ec8e2c39ad2642a8ff1a304b1047c3d6461f697f8c3fb0074650d31dce14f347ee5550ad8a21a9a5b8fea947c940d94e97dbe66a6650e539a333906bbffdfaf491678df4774dd0fbc996d04121f6fdf15866dc6dc70aab978524cf42cab5dddba1ded5f07096a3382c5519f9d7e090202ada60fbb4ae70b54d30d8b73394265c85ca3b61ece9086e0ae4228993ce39ad419bcd2bc33af32c343820879305e98b8c276f881646e056172c90394f6231a0f2159431c4e81f369c2eb0e5655e2ae3e8a85bf1b45da6d3c96722314a335e85e7dc8f99bc274ce421c18b2405dc6e0692d1baa8940735b352c3a599f5f3f8db4d7f25322cfce5745f3dbf16e92fd5d5886afc710bed4e461c07f2b9da20429bced29150479985b388679c2550d283e8085d6079a2b1b7a0928fd6e55c2b04a27a0ffefb7a54b822ebe72eecbbeb649192e7402c50bb34e48a9986c5877bd0ed7c7c3f426bda42f358f39550e2c7d41ef490c4182d64026b20e6255551d8700470fc6ba13041e3d5e2752b4db928dbb9aa8cbffef952816c7ad212284c8bfdca97763804cf738370d3240f707bdd3ca0b210c93c5a517d46f9fd1b74532d1679a9972db0e964e8fca23c54a2210b05c4179f2ebba3e9a78b72119518f2ae8583b21cd50d145f8c32b15609332052bcac93a9f4f5467fe0fed35f1ada745172fab4681d725a62a150a53fc91a3217340e1cf51ac238bb11db7883f6088843fa44cdd756830492dab10c9b0dc4361aecaee59b9ed18b6c6d9b9fa15b961d8daa525aa7a26bcd6e44c77056fc59d1d702db4c19d0312f3a24ef560fa797a9147d902d1a6daae9cb04d1affa2c8972d23fbc7ca8b5ed68ae83410d893fa697a59e1b3d5e0f5158dd6b49bbf403f46945205f59c1aaf6c2dae79cd38bbdf58d9277739590f6264edf8c259f0b3ed125467f8f31256baf51a06f4d06a366306779ce95068e7d904706e8036bc840e5293009b7587e889d468d9d1451bc362b83b12c309e779ae269149ef4bb4ac8c8ac180a0a4eed7dc1f61dce9617d4e09d025900fd4760d4b7303aac1437f3e7aedf5dddff2224f133b93ab8b87c3579197d63b82724b027deab58f2ad0929695c67b226e2ec28c90ae1aa66a3192fcd57f8959fd38a75345bf9d8508f5c2ac661738b943c23154f37720321968b16f0f24cc9b24f5b724cfc2d14af832c162691c77ee906fa2a8c7897381220d9a1b406a9b56d0e8f0ef9fc86ed610ca8aaae8f781b8ea7799ed7b2020f7efdd992da60206de89b6e58bc244a7bfdd283027779e0f123095bd5bc46e183c316be26d0c54df634fc0b7167d68a9393c7409cf348f73c97c326cba7aaf4497109ea911d92be9a347ab4c320b9df2a627f8a7d09ef545e6ad6bc5e759435eb8119c7ce731554aae2a28086f24d357a8ea1bb26455b7a3ff9b30d109c2f08ae81a51252683adcf5d7869750d4da98a1375af4d1d89a248328cfc6536bcbc852e364be9f415b0bec35d8ffc236de6a6ddd17fa2363eda9b441327c7e6b7bdad9d624ef77053ab2e58549a54087aa991454c7d65431230981d7cf45753584b83eef2706231eaed4c1c3b6de50ad900b71ea1ebce666eb21956353aa2edf8568f48901ad0441cb1d236de84e1b09a52046d7ef54d5ebab37234935b43e89ec5f6f6a54e12a99218d5d815124c880a612e6547211ebaf43988cb3b1a4c15ed0850dd5a1517f428aee9657d521361cff8860932dfded8587d8def98e3b5fb9e293c6c6350a47739682cbd10066b384c473c1102124059f995cd43a14c7eb3544eda5c794452157acd449d400428aa1e435f1b1ec6e5338926ae5ad2f0520ee1b6735b689172bfd5b4b50b3c6466135d5df66479faf8768ee7316f783c67c842cfb3803f5ecdac06547aab1899351369cb686ee0d17d626e49890e5a86d967440e451ccd1fd4f6dae87c1a8fc7f6c54e0dcaaecf95070808661fba4afdfa75b8e3b7115034e893d5f80c069eec8de89d85db883e62c7366b456b15f91fd9d527ca842dd620645c73874ea72a4a8013bb7000ef2976a08bb60a076647c7bb04117de24062d14c6f259f8059b42bf9ebde5bee7197e4bff0fbba57c3dd073f9e81e0f075d6cbfd74ea6f4c07968e6f884045e91994a3782c05387a6d42cd623fa654736d8cf48f4caec8f91d045852ec2bfd8806d0731386a4fe96c0cfbcbe935952da6fa9b7d8ce5f62c9f5f62f325d9cd45cab54007201b51bab6267025bcf56ac061800e6d229cbc9856b8770ab9c9b9a689dabe1b32353ba4415dbf9930803f4a372c0160801002da6f167df842710de21cacc1a2d5ea9231af916f4feb371c32c00fab9892cb8b7297d4a3721586c5fb19890f27b177e713c2f3e56d335a64b233dc735d31ae199adcfa05d28548eb90fd09b4b63768d1b94cb9b71add85f4f6f036f9bb88b69021632d42cd29404c89c843c3147bb113ef5c5845709f2326d947"}, &(0x7f00000001c0)=0x1008) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1168.193663][ T789] fuse: Bad value for 'rootmode' [ 1168.213455][ T794] fuse: Bad value for 'rootmode' 10:16:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000980)='./file0\x00') mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7, 0x6d, 0x1}, 0x7) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000009c0)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x7, 0x7, &(0x7f0000000780)=[{&(0x7f0000000240)="3cbf", 0x2, 0x1}, {&(0x7f0000000440)="ae74c97706171fd55b21ec8fa54a4a7fea8b430ba101fbeccebe4b721866bee9742f60e0bef2d18f8f9452957a76cbe65ab2775669b54bf67297fc7e835e2cc58572974a8ceec67cf00ce54549a8e3b7bcaa8095a630a941b446246c6f712500b9aeaac69b5fcd141249fb0b67620da15800c3360a90da027e77deea1ff3e19744716b76fe8cb9eff1a695a3d26370a17314c35d6256a083aa0983211a8ae078e305fd1abc1e4035bac0d31b41769e313d35e6458dc9ecca836568c8dc6e9394442ad3485f25824c18f86b7aec652e86220c545a447ab8eaa0e9c8813b447a6ae2793d3323d3972e862007ae64fc332db7f1131db75a", 0xf6, 0x7fff}, {&(0x7f0000000540)="5f038a2c6684fd92c1d605c7ab5c3bb21e44c46953bb084754aaf15f378579ba6c7d6eeabaf5cd5a1b1a791fc5e948ccb9c0e58bd007634597a637daba3a4f5b04c9dea8ba55c2504479dbcc3e8577dd49718d78743c7f47870cf481d4c9d4091328745c8723223f5224a14b3c1339c21b2c7204cbf53f939baf8da8ee7ee18dc33f51ebd19e478c904a771727c191c8b487d9c8a8410df9d86d3f4bbd5fc7d9a3624a3865ea39193d15b5560723aedbef45a9a0415bd29a61b0d60127b444796378750b1c79dd72e800be7046fe3e98fd13887892ed3985731555be21b3e98c076f4cf30b668c483903f3fdafc5352edc7054", 0xf3, 0x200}, {&(0x7f0000000380)="8b65221e3732ecfbe7f80510fdf35541b257bda7f40a1ba71975296ceb5ca087d707b738d926be74f9b28bb3aa5cdf12f68b0c84aa12c2b6531e18d7a232cde8feae4564befa8313", 0x48, 0x5}, {&(0x7f0000000640)="2bfe52962fe519989eabf61422ee838329571ead6d8cbe3a047e8c5b54a2a9f883271f1453f49e6c80fd891f0e0d116f1364a3d222374a8d53c2bdc6cf222f022323644ac8e775b7a75486ea3dfe2846f59b86ed564e271e235496078aeae453849565437e964de3e0df95937bcd843922c67948ae959eef6f3ba128e7acababe1698ac2e6d1643cac16ad53dff05fdfa9903ae0d6dc6f7ffe771ea7287619abf99184238b001c33a955620610f34387141839a6ad11e16e6e67b3b1444f8636f78a0204535c6c183289b1e5d094625b1d1e21ea51ec1edd63063ef77685e3c81b743d353d5ae57b19b8736a7553", 0xee, 0x7fffffff}, {&(0x7f0000000280)="4ff6d927b6475dc33a7c4cfbe1731cb00ea0ca22f7f5203fbe1438ba46f6337045ff23", 0x23, 0x3}, {&(0x7f0000000740)="8592d1cbb150278ec086d4affe94083009a0d981d162882675cbe33a29863135fcad6f8be31dd55e5b26035e76590a", 0x2f, 0x9}], 0x810000, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r4}}, {@errors_remount='errors=remount-ro'}], [{@subj_user={'subj_user', 0x3d, 'user_id'}}, {@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, 'wlan1wlan0'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@subj_role={'subj_role', 0x3d, 'fd'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@dont_appraise='dont_appraise'}]}) getsockopt$packet_int(r2, 0x107, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 10:16:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024020bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1168.297788][ T792] encrypted_key: master key parameter is missing [ 1168.381790][ T806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=548 sclass=netlink_route_socket pid=806 comm=syz-executor.1 [ 1168.468359][ T806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=548 sclass=netlink_route_socket pid=806 comm=syz-executor.1 10:16:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024030bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:40 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write$P9_RLCREATE(r1, &(0x7f00000000c0)={0x18, 0xf, 0x2, {{0x1, 0x4, 0x3}, 0x4d}}, 0x18) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000100)=0x1) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x7ff, 0x7ffffffc) 10:16:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000180)={{0x3, 0x2}, 'port0\x00', 0x80, 0x0, 0xffff, 0x9, 0x7, 0x7, 0x2, 0x0, 0x1, 0x5}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={r4}, 0x9c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={r4, 0x200, 0x1000}, &(0x7f00000000c0)=0x8) [ 1168.649057][ T824] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=804 sclass=netlink_route_socket pid=824 comm=syz-executor.1 10:16:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/71}) [ 1168.723731][ T824] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=804 sclass=netlink_route_socket pid=824 comm=syz-executor.1 10:16:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024040bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1168.925969][ T847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1060 sclass=netlink_route_socket pid=847 comm=syz-executor.1 [ 1169.007536][ T847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1060 sclass=netlink_route_socket pid=847 comm=syz-executor.1 10:16:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:43 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x143802, 0x0) ftruncate(r2, 0x200004) recvmmsg(r1, &(0x7f0000001400)=[{{&(0x7f00000000c0)=@can, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/4, 0x4}], 0x1, &(0x7f00000001c0)=""/27, 0x1b}, 0x7}, {{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)=""/130, 0x82}, {&(0x7f0000000340)=""/122, 0x7a}, {&(0x7f00000003c0)=""/61, 0x3d}, {&(0x7f0000000400)=""/206, 0xce}, {&(0x7f0000000500)=""/1, 0x1}], 0x5, &(0x7f00000005c0)=""/202, 0xca}, 0x1}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000006c0)=""/130, 0x82}, {&(0x7f0000000780)=""/116, 0x74}, {&(0x7f0000000800)=""/31, 0x1f}, {&(0x7f0000000840)=""/247, 0xf7}, {&(0x7f0000000940)=""/250, 0xfa}, {&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/62, 0x3e}, {&(0x7f0000000b00)=""/90, 0x5a}, {&(0x7f0000000b80)=""/231, 0xe7}], 0x9, &(0x7f0000000d40)=""/144, 0x90}, 0x8}, {{&(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000e80)=""/240, 0xf0}, {&(0x7f0000000f80)=""/57, 0x39}, {&(0x7f0000000fc0)=""/102, 0x66}, {&(0x7f0000001040)=""/208, 0xd0}, {&(0x7f0000001140)=""/23, 0x17}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/238, 0xee}], 0x8, &(0x7f0000002580)=""/4096, 0x1000}, 0x8001}], 0x4, 0x100, &(0x7f0000001500)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:16:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) rt_sigprocmask(0x1, &(0x7f00000000c0)={[0x1]}, &(0x7f0000000100), 0x8) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000180)={'virt_wifi0\x00', 0x1, 0x4d94}) write$6lowpan_control(r0, &(0x7f0000000000)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 10:16:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024050bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1171.243073][ T870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1316 sclass=netlink_route_socket pid=870 comm=syz-executor.1 10:16:43 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x208000, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000100)=0x2, 0x4) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x1e, 0x5}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f00000014c0)=[{{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=[{0x18, 0x107, 0x1, "af"}, {0x68, 0x110, 0xffff, "0b14a21bba6bad62d55bd35ca5fd267f6dd7bae95f9529c9680fe171e2d6b66678288c79bb5d3cac932d80de17f712eb58e88e09cd7a96e426ad692cf154701b68b31cea9d0ec7b28e824355ef823e6ff604dc12201c"}, {0x80, 0x112, 0x10000, "9251cc56ffbbbd7068be9befd57607161d966d7a71767299bd0b08caa2b3d15d7606c182e43fafd30707f41483a6d1d102dd74d405b32ecefd8b2ebf8d86f6d6b26fdba2ec3c8236cba20f06a6268c3986ca8df92998715ddea2a16ff181281cbe678b9d48ef22083904148f7d"}, {0x48, 0x108, 0x0, "52dafc2d9c72143d27071984007f3d0cac88cafb41988c6a0fad3bec6aa1b27399b25e90303ebfce2824d87780953b7d50a98ff7e5ded3b2"}, {0x10, 0x88, 0x3ff}, {0x1010, 0x0, 0x10000, "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"}], 0x1168}}], 0x1, 0x0) writev(r4, &(0x7f0000000240)=[{&(0x7f00000001c0)="0ef98925f640c9119f298b14793e8e8e66ab2c4f29251e85dbabdb5c876c43583fe9a28ca4352a4f1b8a63b3b1d65f1e6ef407cf408d5620a0c751ec4335ff6cc20521c2", 0x44}], 0x1) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x8000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r5, 0x40106614, &(0x7f00000002c0)) r6 = socket(0x2000000000010, 0x80000000002, 0x0) write(r6, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) connect$tipc(r6, &(0x7f0000000140)=@name={0x1e, 0x2, 0x1, {{0x43}, 0x3}}, 0x10) r7 = open(&(0x7f0000000080)='./bus\x00', 0x2040, 0x40) sendfile(r0, r7, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1171.348686][ T870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1316 sclass=netlink_route_socket pid=870 comm=syz-executor.1 10:16:43 executing program 3 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024060bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:43 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1171.521817][ T887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1572 sclass=netlink_route_socket pid=887 comm=syz-executor.1 [ 1171.542973][ T27] audit: type=1804 audit(1588155403.730:384): pid=890 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/924/bus" dev="sda1" ino=16314 res=1 10:16:43 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xf8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0x9, 0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r3, 0xc01064c8, &(0x7f00000000c0)={0x3, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0]}) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) fcntl$getown(r4, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000200)={0x4, [0x0, 0x0, 0x0, 0x0]}) ioctl$CAPI_GET_PROFILE(r5, 0xc0404309, &(0x7f00000001c0)=0x8) [ 1171.619308][ T887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1572 sclass=netlink_route_socket pid=887 comm=syz-executor.1 [ 1171.744006][ T27] audit: type=1804 audit(1588155403.930:385): pid=897 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/925/bus" dev="sda1" ino=16242 res=1 10:16:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024080bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:44 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = dup2(r1, r1) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f00000000c0)) sendfile(r0, r2, &(0x7f0000000000)=0x803, 0x80000000) [ 1171.954800][ T27] audit: type=1804 audit(1588155404.140:386): pid=905 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/926/bus" dev="sda1" ino=16076 res=1 [ 1171.999927][ T907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2084 sclass=netlink_route_socket pid=907 comm=syz-executor.1 [ 1172.098457][ T907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2084 sclass=netlink_route_socket pid=907 comm=syz-executor.1 10:16:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:46 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x1a5) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x5) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024090bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:46 executing program 5: ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000000)={0x7, 0x401, 0x1f}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x521000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000000c0)=0x6, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d676dec61574ff35338e817cba3373c341d8088f76d807479697a551841fc7a247c96f1c454cc90d884605d5a8e9433a072c87070f94542c4f7fa913fd0e14efbce7f2f2dee5afb5afd2afc7f5b7d1507", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:16:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0xc) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1174.344028][ T925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2340 sclass=netlink_route_socket pid=925 comm=syz-executor.1 [ 1174.373456][ T929] fuse: Bad value for 'group_id' [ 1174.382596][ T929] fuse: Bad value for 'group_id' [ 1174.421190][ T925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2340 sclass=netlink_route_socket pid=925 comm=syz-executor.1 10:16:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240a0bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fanotify_init(0x40, 0x101000) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000d6d43ddffa06e338e0c7cb418283d2acab4a18af358d1a2a440a801702e6875f2da6087cf393e65fd1c3974400132451e8b69d5e48f90c14c7ece9391d9195374405381e585223ce4a69ef9f9edab4e814641ac17b5f0c58fde307d4d6e66c939f8d1c03b28aa6d1420d1d03c0cf444c5580206349ca847d5d83d225e38afa6a19b04552b3446cefe0af0094f4841750cd79511300c61beb4168ef2b72bb64085da7f118ef553b57ab01580d6b2091b955acf720691c98738dccb65814720430256b52db2241c243bc1e64deaccf230db3a3027f2539a0a281a1dea9602c6a8c"], 0x48}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)={0x1c, r3, 0x31905e13403123b7, 0x0, 0x0, {0x7, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) r7 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r7, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f00000000c0)={@remote, 0x0}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xf5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x800) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1174.584456][ T944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2596 sclass=netlink_route_socket pid=944 comm=syz-executor.1 [ 1174.726118][ T944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2596 sclass=netlink_route_socket pid=944 comm=syz-executor.1 10:16:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240b0bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:47 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r5, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r7, &(0x7f000000d180), 0x4000000000000eb, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x30017, r7, 0x0) ioctl$TIOCCONS(r6, 0x541d) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) splice(r3, &(0x7f0000000040)=0xfff, r2, &(0x7f00000000c0)=0x4, 0x4, 0x5) 10:16:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYBLOB="2300beac28f807c9288a6eb5df21af4b8216fe9a6ae32ff6592d80916f32f81175f3082499ea", @ANYBLOB="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", @ANYRES64], @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESHEX, @ANYRESDEC=r1, @ANYRESDEC=0x0, @ANYRES64=r2]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000100)={0x3, 0x1, &(0x7f00000000c0)=""/64, &(0x7f0000000180)=""/231, &(0x7f0000000440)=""/250, 0x1}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000040)=r5) [ 1175.088031][ T27] audit: type=1804 audit(1588155407.280:387): pid=986 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/927/bus" dev="sda1" ino=16301 res=1 10:16:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240c0bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000000)=0x6e) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1177.350638][ T1005] selinux_netlink_send: 2 callbacks suppressed [ 1177.350655][ T1005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3108 sclass=netlink_route_socket pid=1005 comm=syz-executor.1 10:16:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file1\x00', &(0x7f00000000c0), 0x1000) [ 1177.415733][ T1005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3108 sclass=netlink_route_socket pid=1005 comm=syz-executor.1 10:16:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240e0bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x8, r0, 0x0, 0x0) [ 1177.630135][ T1024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3620 sclass=netlink_route_socket pid=1024 comm=syz-executor.1 [ 1177.748051][ T1024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3620 sclass=netlink_route_socket pid=1024 comm=syz-executor.1 10:16:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240f0bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1177.906617][ T1034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3876 sclass=netlink_route_socket pid=1034 comm=syz-executor.1 10:16:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024100bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1177.970257][ T1034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3876 sclass=netlink_route_socket pid=1034 comm=syz-executor.1 10:16:50 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ftruncate(r0, 0x200004) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x6, 0x4010, r1, 0x10000000) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e21, 0x44, @ipv4={[], [], @loopback}, 0x7ff}}}, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x80000, 0x0) 10:16:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1178.110445][ T1039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4132 sclass=netlink_route_socket pid=1039 comm=syz-executor.1 [ 1178.188910][ T1039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4132 sclass=netlink_route_socket pid=1039 comm=syz-executor.1 10:16:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024110bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:50 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x90001, 0x181) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8080) splice(r3, &(0x7f00000001c0)=0x8, r4, &(0x7f0000000200)=0x5, 0x263, 0xc) r5 = eventfd(0x1f) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000100)=r5) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r6 = socket$inet6(0xa, 0xa, 0xdf) ioctl(r6, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000240), &(0x7f00000000c0)=0x4) r7 = socket(0x2000000000010, 0x80000000002, 0x0) write(r7, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) recvfrom$inet(r7, &(0x7f0000000140)=""/50, 0x32, 0x2062, &(0x7f0000000280)={0x2, 0x4e21, @multicast2}, 0x10) [ 1178.339461][ T1056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4388 sclass=netlink_route_socket pid=1056 comm=syz-executor.1 [ 1178.389968][ T1056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4388 sclass=netlink_route_socket pid=1056 comm=syz-executor.1 10:16:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024120bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:52 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r2, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet6_dccp_int(r2, 0x21, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1180.491960][ T27] audit: type=1804 audit(1588155412.671:388): pid=1078 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/930/bus" dev="sda1" ino=16252 res=1 10:16:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024130bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xe, 0x0) 10:16:52 executing program 5: ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000180)=""/177) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024140bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00bb94", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r0, 0x1000008b11, &(0x7f0000000000)) pipe(&(0x7f0000000080)) r1 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r1, 0x1000008b11, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r2, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@broadcast, @in=@local}}, {{@in6=@private2}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) bind$tipc(0xffffffffffffffff, &(0x7f0000000300)=@name={0x1e, 0x2, 0x2, {{0x43, 0x4}, 0x4}}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r5, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x40b0, 0x1) 10:16:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024600bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024003db4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d06003030000000000000311930302f30303034303030302c757365725f69643cf985579155c842a8abc1cb60dcff7a68d76f1e5a940bcf7f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:55 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x168) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./bus\x00', 0x6, 0x1) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x0, @llc={0x1a, 0x302, 0x5, 0x5, 0x38, 0x81, @multicast}, @nfc={0x27, 0x1, 0x2, 0x4}, @l2tp={0x2, 0x0, @loopback, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='tunl0\x00', 0xc13, 0x7, 0x731}) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1183.482823][ T1153] fuse: Bad value for 'rootmode' 10:16:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0xffff, 0x7, 0x9, 0x2, 0x47, 0x8}) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x800) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1183.503927][ T1157] fuse: Bad value for 'rootmode' [ 1183.517967][ T27] audit: type=1804 audit(1588155415.701:389): pid=1152 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/931/bus" dev="sda1" ino=16242 res=1 10:16:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7e, 0x0) 10:16:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000002403ffb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0xc, &(0x7f0000000440)=@dstopts={0x2c, 0x25, [], [@pad1, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xd5}, @generic={0x7f, 0xe0, "19c6a82a2cea5207b16341ca87c9a26b53e45af2c9bd7c8a79710262bafbdeb604c9bc288f0d648dab0c83f28eccb9c304e71e63c65073b4cbdce3c903b784feaaa3ee7d2fa2d0c2f78b6bc81a6382bcb565f1c6cbe3133a4c7fce83f8db439c660c82ac2917c530bd032c61bc06a157b8b589e1eba5d9fb3326e8895767cc612bab35af2acb4a95d06ed2bfd9f115b69c7dc2e8250c52da12c4dd839d25739f86791451514136eb0790be8c1e48304dbe73a3844e73a0c17477d6e8ffc0c603cb76632324e0492fad2a5932acb006c07ee9954acde1edaee9a430d5e5aef08e"}, @enc_lim={0x4, 0x1, 0x3f}, @calipso={0x7, 0x28, {0x1, 0x8, 0x2, 0x20, [0x8, 0x5, 0xffffffffffff8001, 0x9]}}, @pad1]}, 0x138) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r6, @ANYBLOB="2c00f925f5b4cf5ad4c8cd779b2ea44a1277afafed046ee26c0aaad9b47a2e8d0df09da848b87df253b392cea022a9a88a2025b8c126081b3a5a1ca26ac94bfef56657ea25559500"/81]) mount$fuse(0x0, &(0x7f0000000400)='\x00', &(0x7f00000002c0)='fuse\x00', 0x40004, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1183.822119][ T1171] selinux_netlink_send: 8 callbacks suppressed [ 1183.822133][ T1171] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=804 sclass=netlink_route_socket pid=1171 comm=syz-executor.1 10:16:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) accept4$rose(r1, &(0x7f0000000100)=@full={0xb, @remote, @default, 0x0, [@default, @bcast, @null, @default, @default, @netrom]}, &(0x7f0000000180)=0x40, 0x80800) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302cc436a6e49911a11f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x82080, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000000)={0x1, 0x4000, 0x10000, 0x5, 0xfff}) [ 1183.960661][ T1171] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=804 sclass=netlink_route_socket pid=1171 comm=syz-executor.1 [ 1184.073820][ T1194] fuse: Unknown parameter 'Ä6¦ä™¡00000000000000000000' [ 1184.108247][ T1196] fuse: Unknown parameter 'Ä6¦ä™¡00000000000000000000' 10:16:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000240005b4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f3, 0x501800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000180)={0x2, 0x0, {0x3, 0x0, 0x7, 0x0, 0x2}, 0x4}) r1 = socket(0x27, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) accept4$vsock_stream(r1, &(0x7f0000000240)={0x28, 0x0, 0x2711}, 0x10, 0x800) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f00000000f6d930923798116d4e81b6c9bc64653d30303025fd2a42585d7baa92b7864c4ef9896f4c271823060000000000000030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='(\x00']) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000200)={0x1, 0x1, 0xe, 0x1c, 0x1c7, &(0x7f0000000440)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1184.314012][ T1206] fuse: Unknown parameter ' d' 10:16:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)=0x3) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024003db4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:58 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x2, @broadcast, 'bond0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x101000, 0x0) sendfile(r1, r3, &(0x7f0000000040)=0x5, 0x615) 10:16:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1186.568317][ T27] audit: type=1804 audit(1588155418.751:390): pid=1226 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/932/bus" dev="sda1" ino=16234 res=1 10:16:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xe00, 0x0) 10:16:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0200000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f00000001c0)={0x3, 0x3, 0x9, 0xffe1, 0x2, 0x0, &(0x7f0000000180)="df28"}) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x1000, 0x7, 0x3a, &(0x7f00000000c0)="e1740b93ce8098beeb72b11443c6f8522193562c3291c01849b7559ac3240d6fefeb9c7cef49a4202b9c16cba3f7e12d3097b7a68bc2e4598148"}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c03726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,max_read=0x0000000000000005,max_read=0x000000000000000c,default_permissions,blksize=0x0000000000000400,max_read=0xfffffffffffffff9,allow_other,allow_other,allow_other,\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) times(&(0x7f0000000000)) [ 1187.077470][ T1265] fuse: Unknown parameter 'roup_id' [ 1187.092494][ T1269] fuse: Unknown parameter 'roup_id' 10:16:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:16:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0300000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:16:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x100000, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, 'user_id'}}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000000)) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:16:59 executing program 5: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x1000, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=0000000000000000000000,user_id=\x00', @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYRESDEC=r1, @ANYPTR, @ANYRES16=0x0, @ANYRES32=r1], @ANYRESDEC, @ANYRESHEX=r1, @ANYBLOB="7af4", @ANYBLOB="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", @ANYPTR64, @ANYBLOB="24d76db973997391dc87a55cdf460f29edd9ea0c6ee63a20614edd9b2445ac842664fa56e488fe90fccf0811385a2e087dbc7893ee87742ac887e2cf1be190324d1b5bb8c67c24b311bebfa131db86c0975e37e94a532816c5fbe44364487bbbc275a7f1bd4afe72c06f47db6fdfaa7e3f36137fccf2be3c83f5b683d1e731e43315336a6497dc87968d86983ca658e8e837dbe9f5658bac383b48999150968bc0d3879c3e481f563f3dbb709d6f2c55b5d583455d6d4a6df7283410713e9e76a6a32b01c042a7b5ccff40b8105014c51c3ea70505d0936074eb2590792e134574c750a1473f43af43", @ANYRESDEC=r1, @ANYRES64=r2], @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl(r3, 0x3000000, &(0x7f0000000180)="4182cfa489a73d772af0a6bf02866c30fb723a9b5dd7e1c2cf514b4b700f4ce1584581dd3fb818a6ee1b7ba3110d10ca69a6cfb4158c6e528ec56761b9bd9b70b2bd126a9431fdcb6a512b3ef03900db3aee90d72701fc2311ba1ddcb24d72c2da26d6bf50e72296f1ec87a6be7b301ddacb0ac5563f3c92423616eb069a3c0addadaa6c8eb3cabf90") [ 1187.539983][ T1289] fuse: Invalid rootmode [ 1187.590892][ T1289] fuse: Invalid rootmode 10:17:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0400000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:01 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x58003, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74d8dabf68c26fe2b410303030303030303030302c757365725f694f03000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) [ 1189.613589][ T1298] fuse: Unknown parameter 'rootØÚ¿hÂoâ´0000000000' 10:17:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x3f00, 0x0) 10:17:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000002, 0x10012, r0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000000)=0xc23) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="0300007f4760cfc22a173ce278d6efa7e7bce47efdfb0d238966c3e188cd0e1ba814c83f8fc30138265fff542ac293bd1c67c66f24130842ca324b333275e146250cdcfb298d77fd345dfbb7356e85cdd774cf5cb7a1d9808c6d1fcf5d08095b412c9413ac013ec131f2c2fe3d9f87b80d6f7f3f721b5dd69974e91501eb388be4874229ae1067975994677635af4144dd7aaa42edab68076f6c633c8b29a827a4", @ANYRES16=r2, @ANYBLOB="01000000000000000000010000000000000002410000000300136574683a6c6f0000"], 0x28}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c080}, 0x20000050) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000000c0)) 10:17:02 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) ftruncate(0xffffffffffffffff, 0x20) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0500000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1190.110998][ T27] audit: type=1804 audit(1588155422.292:391): pid=1333 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/934/bus" dev="sda1" ino=16376 res=1 [ 1190.212080][ T27] audit: type=1804 audit(1588155422.342:392): pid=1333 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/934/bus" dev="sda1" ino=16376 res=1 10:17:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) write$fb(r1, &(0x7f0000000180)="23f7cd848537d29c429fc9986b14de2ed979525c8f4ec05969bf0ca5fc32ed36a854b87cf2c7a375a6107f0ae150184ad7e6711db589d08cd3974f7ae33adf233617814c88fae7154d882035aef7badcd2f31061842a31a6469d9889d90b7b27994cb573c92f5cfd1a8a98db7fa2f0ffee2bd43cce4578c9f350cc806ea6a11e82cb61025f8fa7976083376e260c83cdab6f957996ee43c34e6749", 0x9b) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:17:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0600000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:02 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x440100, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000200)) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket(0x2000000000010, 0x80000000002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r6 = socket(0x2000000000010, 0x80000000002, 0x0) write(r6, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000002f40)={0x0, @rand_addr, @empty}, &(0x7f0000002f80)=0xc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002fc0)={0x19, 0xfffffffd, 0xffff0001, 0x6, 0x76c, r5, 0x3, [], r7, r8, 0x5, 0x2, 0x5}, 0x40) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/6, 0x6}], 0x2, &(0x7f0000000400)=""/100, 0x64}, 0x102) write(r4, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_KEY(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r9, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_KEY_SEQ={0xc, 0xa, "ce7688f76ad26bc4"}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x800) sendfile(r1, r3, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1190.467957][ T27] audit: type=1804 audit(1588155422.652:393): pid=1344 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/935/bus" dev="sda1" ino=16376 res=1 10:17:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:04 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x2, &(0x7f0000000000)='\x00', &(0x7f0000000180)="7990b404e6be0dd9d3b602737f530143dd64cfd830fc208fba3c0ef617a9e5c032f5953f464debdb84f55d7875d6b6a307a50e397eda98ea2cb3ab13a0bc9d72f2dc0dc60ab800addf02b98ef47d5e79cfd2f1340d89b79c814472ba93c046c81ea99bb2a573fb9e5dca67f3c572f43458bedc9ecf6e0e5d91ff21b4ab3ea898a31538c6b5b82d3fe44bd30d71de51bd021ecb4374cf", 0x96) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:17:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0800000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/71}) 10:17:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7e00, 0x0) 10:17:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0900000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0a00000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0b00000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/71}) 10:17:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0c00000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0e00000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:17:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0f00000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/71}) 10:17:07 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xc8901, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)=0x1) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0xff, 0x0, 0x0, 0xffffffffffffff24}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000100)={0xffffffffffff0001, r3}) ftruncate(r1, 0x200004) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x90, 0x1, 0x2, 0x5, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_EXPECT_TUPLE={0x7c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x2d}}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x35}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x24008004}, 0x4048000) 10:17:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1000000, 0x0) 10:17:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:17:08 executing program 4: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000000000)=0x7ff, 0x80000000) r4 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r4, 0x1000008b11, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 1196.192235][ T27] audit: type=1804 audit(1588155428.372:394): pid=1452 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/937/bus" dev="sda1" ino=16310 res=1 10:17:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c1000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 10:17:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) 10:17:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c1100000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c1200000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c1300000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c1400000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xe000000, 0x0) 10:17:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c6000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0xf0, 0x0) 10:17:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:11 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = accept$phonet_pipe(r2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='vxcan1\x00'}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000140)={0x4, 0x4}) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cf000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1199.673072][ T27] audit: type=1804 audit(1588155431.852:395): pid=1542 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/938/bus" dev="sda1" ino=16232 res=1 10:17:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0003000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0006000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x3f000000, 0x0) 10:17:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c7308000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0009000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:14 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) bind$bt_sco(r1, &(0x7f0000000040), 0x8) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) open(&(0x7f00000000c0)='./bus\x00', 0x1bf8c2, 0x8c) 10:17:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1202.732856][ T27] audit: type=1804 audit(1588155434.913:396): pid=1597 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/939/bus" dev="sda1" ino=16379 res=1 10:17:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000a000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1202.831621][ T27] audit: type=1804 audit(1588155434.983:397): pid=1597 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/939/bus" dev="sda1" ino=16379 res=1 10:17:15 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x462101, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, &(0x7f00000001c0)={0x80fd, 0x1}) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r3}}]}) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000100)) r6 = open(&(0x7f0000000080)='./bus\x00', 0x181000, 0x0) sendfile(r0, r6, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000b000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:15 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) mq_timedreceive(r1, &(0x7f00000002c0)=""/225, 0xe1, 0xffffffff, &(0x7f00000003c0)={r2, r3+60000000}) ftruncate(r1, 0x200004) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") write$binfmt_misc(r4, &(0x7f00000001c0)={'syz1', "73d80df123844d9e2483f362f1d313207f7484b0471ba00691597951fb33ec3cfb99223121c60c7e4f4afd29c98175fd0df779a35291d6a8e87a3092b42d0a66428eae92b668992e2440c0712f6c3bafc80cc1afd868775903e3ce9a1dc689c0b1581729e7698335c2e95ea8dc909ca9510fc43d6e64fcab4fdb215d75270810547726513e7a905dcbbbbfd1f6ff63fe8204813c5a92bae91a7aabcc484003cb19c9248cf718c9add04157a392bf0f2729b7c23c789b0abe21a212df382ccafc428640cc1db188ea647191ed3543631bb1a8ec4d971fb34af536fb1d6dab77ebd86e30726b469cdec6c45929a00f1569413a"}, 0xf6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r8}}]}) fchownat(r4, &(0x7f0000000400)='./bus\x00', r6, r8, 0x1000) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1203.218502][ T27] audit: type=1804 audit(1588155435.403:398): pid=1627 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/941/bus" dev="sda1" ino=16262 res=1 10:17:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7e000000, 0x0) 10:17:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000c000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000e000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000f000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1205.954194][ T1684] ptrace attach of "/root/syz-executor.0"[1682] was attempted by "/root/syz-executor.0"[1684] 10:17:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1206.018249][ T1687] fuse: Bad value for 'fd' [ 1206.148182][ T1691] fuse: Bad value for 'fd' 10:17:18 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1414c2, 0x40) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x480200) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1206.281388][ T27] audit: type=1804 audit(1588155438.463:399): pid=1696 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/942/bus" dev="sda1" ino=16245 res=1 10:17:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfeffffff, 0x0) 10:17:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0011000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1208.418409][ T1702] fuse: Bad value for 'fd' 10:17:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0012000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:21 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0013000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:21 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1208.972915][ T1735] ptrace attach of "/root/syz-executor.0"[1734] was attempted by "/root/syz-executor.0"[1735] 10:17:21 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:21 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x143943, 0xe8) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfffffffe, 0x0) 10:17:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0014000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:23 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:24 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000040)='wg1\x00', 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:24 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1211.828162][ T27] audit: type=1804 audit(1588155444.013:400): pid=1770 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/944/bus" dev="sda1" ino=16382 res=1 10:17:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c003f000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1212.077550][ T1782] fuse: Bad value for 'fd' [ 1212.111708][ T1785] ptrace attach of "/root/syz-executor.0"[1784] was attempted by "/root/syz-executor.0"[1785] 10:17:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c6558000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1212.191770][ T1793] fuse: Bad value for 'fd' [ 1212.301243][ T1799] fuse: Bad value for 'fd' 10:17:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x100000000000000, 0x0) 10:17:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0060000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c5865000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:27 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket(0x2000000000010, 0x80000000002, 0x0) r3 = socket(0x2000000000010, 0x80000000002, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r6, 0x2}, 0x8) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) bind$rds(r2, &(0x7f00000003c0)={0x2, 0x4e22, @rand_addr=0x64010101}, 0x10) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, &(0x7f0000000000)=0x7ff, 0x80000000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0xff, 0x0, &(0x7f00000002c0), 0x1112024, &(0x7f0000000340)={[], [{@context={'context', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r8, 0x0) ioctl$IOC_PR_RESERVE(r8, 0x401070c9, &(0x7f0000000100)={0x40, 0x81, 0x1}) 10:17:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0873000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1215.169855][ T27] audit: type=1804 audit(1588155447.353:401): pid=1841 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/945/bus" dev="sda1" ino=16211 res=1 10:17:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xe00000000000000, 0x0) 10:17:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0081000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00f0000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:30 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x24, r4, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8}]}, 0x24}}, 0x0) r7 = socket(0x2000000000010, 0x80000000002, 0x0) write(r7, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) accept4$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x80000) r9 = socket(0x200000000000011, 0x3, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) bind$packet(r9, &(0x7f0000000240)={0x11, 0x0, r11}, 0x14) getsockname$packet(r9, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="f300000000000000120012000b0001006970766c616e00000400020008000500", @ANYRES32=r12, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r4, 0x300, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4800) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0040030000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1218.294699][ T27] audit: type=1804 audit(1588155450.484:402): pid=1926 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/946/bus" dev="sda1" ino=15815 res=1 10:17:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1218.425756][ T1937] fuse: Bad value for 'fd' 10:17:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x3f00000000000000, 0x0) 10:17:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0003400000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1220.662227][ T1946] fuse: Bad value for 'fd' 10:17:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cfffff00000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1221.056360][ T1965] fuse: Bad value for 'fd' 10:17:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000100", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:33 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000040)=0x1, 0x4) ftruncate(r1, 0x200004) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_PID={0x8, 0x52, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8001, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_PID={0x8, 0x52, r4}]}, 0x38}}, 0x40055) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1221.345339][ T1978] fuse: Invalid rootmode 10:17:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) [ 1221.459253][ T1990] fuse: Invalid rootmode [ 1221.532125][ T27] audit: type=1804 audit(1588155453.714:403): pid=1986 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/947/bus" dev="sda1" ino=16233 res=1 [ 1221.613310][ T1994] fuse: Invalid rootmode 10:17:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7e00000000000000, 0x0) 10:17:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000300", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000400", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000500", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:36 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000600", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1224.631182][ T27] audit: type=1804 audit(1588155456.814:404): pid=2046 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/948/bus" dev="sda1" ino=16227 res=1 10:17:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000800", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x8000000000000000, 0x0) 10:17:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000900", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/207) 10:17:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000a00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000b00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000c00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(0x0, &(0x7f0000000180)=""/207) 10:17:39 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x2000, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x2800, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000e00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(0x0, &(0x7f0000000180)=""/207) 10:17:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfeffffff00000000, 0x0) 10:17:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000f00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(0x0, &(0x7f0000000180)=""/207) 10:17:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:42 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={r4}, 0x9c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r4, 0x9, 0x800, 0x7, 0x6, 0x8}, 0x14) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r5, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) ftruncate(r1, 0x200004) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r6, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 10:17:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000001000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:42 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x5450, 0x0) 10:17:42 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x8c000, 0x8) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:42 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x3) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) [ 1230.573597][ T27] audit: type=1804 audit(1588155462.765:405): pid=2174 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/951/bus" dev="sda1" ino=16223 res=1 10:17:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000001100", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xffffffff00000000, 0x0) 10:17:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030000030000000000000000000000fe800000c000000000000000000000bbff020000400000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000d40400000000000000000000000000000000000000001d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000027465616d5f736c6176655f310000000000000000000000000000000000000000000000008800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000f10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61af10800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a60000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) [ 1232.902013][ T2196] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:17:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:45 executing program 5: r0 = socket(0x11, 0x1, 0x81) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) r3 = socket(0x904748b6daf4ca67, 0x3, 0x40) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4010}, 0x120480c9) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6}, 0x10) recvfrom$inet6(r1, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) socket(0x26, 0x800, 0x3) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000040)={r7, 0x1, 0x6}, 0x10) r8 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000280)={r9, 0x1, 0x6, @random="109b8553d862"}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000011", 0x5, 0x0, 0x0, 0x0) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 10:17:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000001300", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1233.248614][ T2213] device lo entered promiscuous mode [ 1233.256761][ T2213] netlink: 44335 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1233.323944][ T2210] device lo left promiscuous mode [ 1233.454313][ T2213] device lo entered promiscuous mode [ 1233.473578][ T2221] netlink: 44335 bytes leftover after parsing attributes in process `syz-executor.5'. 10:17:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000001400", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:45 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x341042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x149202, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1233.541965][ T2210] device lo left promiscuous mode 10:17:45 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x101, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000180)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x161042, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) fchdir(r4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x0, 0x3, 0x1, 0x201}, {0x4, 0x4, 0xd2}, {0x8ee3, 0x7, 0x9, 0x80}]}, 0x10) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:45 executing program 5: syz_emit_ethernet(0x8e, &(0x7f0000000100)={@broadcast, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "9b268c", 0x58, 0x0, 0x0, @remote, @dev, {[@srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @mcast1, @private0]}]}}}}}, 0x0) 10:17:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000003f00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1233.745184][ T27] audit: type=1804 audit(1588155465.935:406): pid=2236 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/953/bus" dev="sda1" ino=16245 res=1 10:17:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe) 10:17:48 executing program 5: unshare(0x6c060000) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="03"], 0x1}}, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)=[{0x24, 0x1}], 0x10}}], 0x2, 0x0) 10:17:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000006000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1235.994960][ T2252] IPVS: ftp: loaded support on port[0] = 21 [ 1236.031080][ T2257] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1236.049151][ T2257] device lo entered promiscuous mode [ 1236.059812][ T2257] device tunl0 entered promiscuous mode [ 1236.074881][ T2257] device gre0 entered promiscuous mode [ 1236.083425][ T2257] device gretap0 entered promiscuous mode [ 1236.091049][ T2257] device erspan0 entered promiscuous mode [ 1236.103294][ T2257] device ip_vti0 entered promiscuous mode [ 1236.117030][ T2257] device ip6_vti0 entered promiscuous mode [ 1236.128550][ T2257] device sit0 entered promiscuous mode [ 1236.148056][ T2257] device ip6tnl0 entered promiscuous mode [ 1236.167879][ T2257] device ip6gre0 entered promiscuous mode [ 1236.178153][ T2257] device syz_tun entered promiscuous mode [ 1236.189957][ T2257] device ip6gretap0 entered promiscuous mode [ 1236.201190][ T2257] device vcan0 entered promiscuous mode [ 1236.216676][ T2257] device bond0 entered promiscuous mode [ 1236.226568][ T2257] device bond_slave_0 entered promiscuous mode [ 1236.239378][ T2257] device bond_slave_1 entered promiscuous mode [ 1236.259553][ T2257] device team0 entered promiscuous mode 10:17:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000586500", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1236.285266][ T2257] device team_slave_0 entered promiscuous mode [ 1236.297125][ T2257] device team_slave_1 entered promiscuous mode [ 1236.307620][ T2257] device dummy0 entered promiscuous mode [ 1236.336769][ T2257] device nlmon0 entered promiscuous mode [ 1236.403826][ T2257] device caif0 entered promiscuous mode [ 1236.409439][ T2257] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 10:17:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000087300", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:48 executing program 5: unshare(0x6c060000) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="03"], 0x1}}, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)=[{0x24, 0x1}], 0x10}}], 0x2, 0x0) 10:17:48 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@setneightbl={0x84, 0x43, 0x8, 0x70bd28, 0x25dfdbfe, {0x1b}, [@NDTA_PARMS={0x20, 0x6, 0x0, 0x1, [@NDTPA_APP_PROBES={0x8, 0x9, 0xffffffb4}, @NDTPA_PROXY_QLEN={0x8, 0xe, 0x3ff}, @NDTPA_ANYCAST_DELAY={0xc, 0xc, 0x5}]}, @NDTA_GC_INTERVAL={0xc, 0x8, 0x1f}, @NDTA_THRESH1={0x8, 0x2, 0x9}, @NDTA_THRESH3={0x8, 0x4, 0x80}, @NDTA_THRESH3={0x8, 0x4, 0x10001}, @NDTA_GC_INTERVAL={0xc, 0x8, 0xfffffffffffffffa}, @NDTA_THRESH1={0x8, 0x2, 0x3}, @NDTA_NAME={0x5, 0x1, '\x00'}, @NDTA_THRESH3={0x8, 0x4, 0x3}, @NDTA_THRESH1={0x8, 0x2, 0x6908}]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000200)={0x2, 0x1, 0x4, 0x80000, 0x6, {}, {0x1, 0x8, 0x2, 0x4, 0x81, 0x3f, "f80e788d"}, 0x0, 0x2, @userptr, 0x74, 0x0, r2}) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000280)=0x40) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7ff, 0xffffffffffffff80) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f00000002c0)) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 1236.750862][ T2300] IPVS: ftp: loaded support on port[0] = 21 10:17:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000008100", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1236.791208][T17091] tipc: TX() has been purged, node left! [ 1236.813045][ T2302] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1236.876021][ T27] audit: type=1804 audit(1588155469.065:407): pid=2306 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/954/bus" dev="sda1" ino=16252 res=1 [ 1236.928220][ T2302] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1236.987046][ T27] audit: type=1804 audit(1588155469.135:408): pid=2306 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/954/bus" dev="sda1" ino=16252 res=1 10:17:49 executing program 4: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet(0x2, 0x6, 0x8ea) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x2400) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x8, 0xfffffffd, 0x7, 0x6, 0x7, 0x80}) r4 = socket(0x2000000000010, 0x80000000002, 0x0) write(r4, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) sendmsg$IPSET_CMD_DEL(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xe8}, 0x1, 0x0, 0x0, 0x810}, 0x40) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000002, 0x10012, r2, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000040)) ftruncate(r1, 0x200004) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000000200)=0x7ff, 0x2008001) flistxattr(r1, &(0x7f00000000c0)=""/15, 0xf) [ 1237.078941][ T27] audit: type=1800 audit(1588155469.165:409): pid=2312 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16252 res=0 [ 1237.158536][ T27] audit: type=1800 audit(1588155469.165:410): pid=2306 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16252 res=0 [ 1237.269595][ T2323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=2323 comm=syz-executor.4 10:17:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cffffa88800", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e) 10:17:51 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x2, 0x5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="f300000000000000120012000b0001006970766c616e00000400020008000500", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000df0187e92ae27037", @ANYRES32=0x0, @ANYBLOB="f300000000010000120012006e0000040001dd08000500"/32, @ANYRES32=r7, @ANYBLOB="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"], 0x3c}}, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="f300000000000000120012000b0001006970766c616e00000400020008000500", @ANYRES32=r11, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xe4, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r11}}, {0x8}}}]}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x240cc080}, 0x20000000) 10:17:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @local}, {0x2, 0x0, @empty}}) [ 1239.047449][ T27] audit: type=1804 audit(1588155471.235:411): pid=2352 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/956/bus" dev="sda1" ino=15925 res=1 10:17:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cae25ff9200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:51 executing program 5: 10:17:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:51 executing program 5: 10:17:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cffffff9e00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:51 executing program 5: 10:17:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c92ff25ae00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:52 executing program 5: [ 1241.521097][T17091] tipc: TX() has been purged, node left! 10:17:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe00) 10:17:54 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x10012, r3, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r3, 0x8000000) 10:17:54 executing program 5: [ 1242.168272][ T27] audit: type=1804 audit(1588155474.356:412): pid=2399 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/957/bus" dev="sda1" ino=16163 res=1 10:17:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cfffffff000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:54 executing program 5: 10:17:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:54 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000040)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x30, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, '$\x00@', 0x0, 0x0, 0x0, @loopback, @mcast2}}}}}}}, 0x0) syz_emit_ethernet(0x50, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbffffc200000191004e0081003a0008050301fdb7edfcdbabd9b28d6e911819e89ab2379ea057bc9ac78ec68424ece85c209d85090efba8c60a000000000000139fa463ab8b8d17c505c5"], &(0x7f0000000180)) 10:17:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cfffffffc00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x1ff, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c88a8ffff00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00f0ffff00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) readv(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1) 10:17:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3f00) 10:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c7fffffff00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:57 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000240)={0x0, 0xb203, &(0x7f0000000400)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2, 0xdb}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) 10:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c9effffff00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1245.567437][ T2463] tipc: Started in network mode [ 1245.580942][ T2463] tipc: Own node identity ff020000000000000000000000000001, cluster identity 4711 [ 1245.603487][ T2463] tipc: Enabling of bearer rejected, failed to enable media 10:17:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:17:58 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x2e8d40, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x28}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) fchdir(r2) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r7, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x1ff, 0x1, 0x4, 0x80000000, 0x7e8f, {0x0, 0xea60}, {0x4, 0x7, 0x8c, 0x5, 0x0, 0x6, "cafa68ee"}, 0x80000001, 0x3, @offset=0x9, 0x9, 0x0, r7}) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r10) futimesat(r1, &(0x7f00000000c0)='./bus\x00', &(0x7f00000001c0)={{r3, r4/1000+10000}, {r5, r6/1000+10000}}) r11 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r11, &(0x7f0000000000)=0x7ff, 0x80000000) 10:17:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x7a, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf9b3}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 10:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cf0ffffff00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cfcffffff00", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1246.020723][ T27] audit: type=1804 audit(1588155478.206:413): pid=2480 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/958/bus" dev="sda1" ino=16286 res=1 10:17:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x20, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000880)={@local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a5b008", 0x10, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @ndisc_ra}}}}}, 0x0) [ 1246.130892][ T27] audit: type=1804 audit(1588155478.316:414): pid=2493 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/958/bus" dev="sda1" ino=16286 res=1 10:17:58 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)={0xfffffffffffffebb, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x8) ftruncate(r1, 0x200004) r3 = socket(0x2000000000010, 0x80000000002, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r5, &(0x7f000000d180), 0x4000000000000eb, 0x0) write(r0, &(0x7f0000000180)="5d4fa5c71a0024f000340093000100000000000000000100480500060000000000000000", 0xfffffffffffffea5) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f0000000680)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f0000000740)=ANY=[@ANYBLOB="28040000010303000000000000000000020000099c000a005e37ce0026001c4e15a4c50bb754780ffe85b51255c5e2626aae788ba7f68f45417a83ec228685ec8d8e6a6149f88cfcad70d9927e6fd274c9ed70fc46dd9f3d1836560345be12cf79f373d061bf75ebcf26136a01a874e02958a2943154e4f95942849527ed97bba55360e576bb9a1c434e00633346ce375c60ddd34d1ae82c4663e522c899f8bbf0a225d183c7d1596e4f1cbaac2605d814000f800800084000000001080009400000080008000340fffff9399c010f8008000b0073697000440001800c00028005000100010000000c000280050001008400000014000180080001006401010008000200ffffffff06000340000300000c00028005000100010000000a000b00512e393331000000540001800c000280050001008800000006000340000200001400018008000100e0000002080002000000000006000340000100001400018008000100e000000108000200ac1414aa0c0002800500010021000000e40003800c000280050001002f0000002c000180140003000000000000000000000000000000000114000400fc0100000000000000000000000000012c00018014000300fe8000000000000000000000000000aa14000400fc0100000000000000000000000000012c000180140003002001000000000000000000000000000014000400fe880000000000000000000000000001060003400001000006000340000200002c00018014000300fe880000000000000000000000000101140004000000000000000000000000000000000014000180080001000a01010008000200e0000001080009400000003f20000f800e000600736e6d700000090006007070747000000000a0010f800800084000000000060007400004000008000b007369700008000540000000037c010a80980002801400018008000100ac1414aa080002007f0000012c00018014000300ff02000000000000000000000000000114000400fc01000000000000000000000000000006000340000000000600034000040000060003400001000006000340000300000c00028005000100110000001400018008000100ac1e000108000200e000000206000340000200000c000280050001002f000000240002800c000280050001006b00000014000180080001000000000008000200ac1414bb0800014000000000100002800c00028005000100be0000005000028006000340000400002c00018014000300ff02000000000000000000000000000114000400fc0100000000000000000000000000010c00028005000100880000000c00028005000100840000005400028006000340000200001400018008000100ac1e000108000200ac1414bb2c000180140003002001000000000000000000000000000014000400fc00000000000008000000000000000006000340000400006d4bbeca39e8dcdabd344d80e42ea4d0dab28d8c861a7b4136b8336247"], 0x428}, 0x1, 0x0, 0x0, 0x24040000}, 0x4080) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000006c0)=0x33a) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r6, &(0x7f0000000000)=0x7ff, 0x80000000) setsockopt$X25_QBITINCL(r6, 0x106, 0x1, &(0x7f0000000100), 0x4) [ 1246.206234][ T27] audit: type=1800 audit(1588155478.356:415): pid=2480 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16286 res=0 [ 1246.275021][ T27] audit: type=1800 audit(1588155478.396:416): pid=2493 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16286 res=0 [ 1246.449628][ T2508] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=769 sclass=netlink_route_socket pid=2508 comm=syz-executor.4 [ 1246.470195][ T27] audit: type=1804 audit(1588155478.656:417): pid=2508 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/959/bus" dev="sda1" ino=16379 res=1 10:18:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e00) 10:18:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:00 executing program 5: 10:18:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6cffffffffff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:01 executing program 5: 10:18:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:01 executing program 5: 10:18:01 executing program 5: 10:18:01 executing program 5: 10:18:01 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x280002, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1249.369812][ T27] audit: type=1804 audit(1588155481.556:418): pid=2551 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/960/bus" dev="sda1" ino=16261 res=1 10:18:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x1000000) 10:18:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:03 executing program 5: 10:18:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) prctl$PR_GET_FP_MODE(0x2e) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f00000001c0)=0x7) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@loopback, @loopback}, &(0x7f0000000140)=0x8) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 10:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:04 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) fgetxattr(r1, &(0x7f0000000040)=@random={'trusted.', '/dev/adsp1\x00'}, &(0x7f00000000c0)=""/230, 0xe6) [ 1252.598851][ T27] audit: type=1804 audit(1588155484.786:419): pid=2591 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/961/bus" dev="sda1" ino=16261 res=1 10:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe000000) 10:18:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:06 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, &(0x7f00000001c0)=0x202, 0x4000000000dc) 10:18:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) sendmmsg$inet(r0, &(0x7f0000005c00)=[{{&(0x7f00000040c0)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_tos_int={{0x10}}], 0x10}}], 0x1, 0x0) 10:18:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) read(r0, &(0x7f0000000100)=""/66, 0x42) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'vlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="050341a006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 10:18:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:07 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000040)=0x7ff, 0x29) 10:18:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1255.587327][ T27] audit: type=1804 audit(1588155487.777:420): pid=2646 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/962/bus" dev="sda1" ino=16301 res=1 10:18:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3f000000) 10:18:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x905, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000400)) 10:18:09 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000340)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000000, 0x0) setuid(0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000280)='fuseblk\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) tkill(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x5871cb18d4c21a2e) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x2, 0x4, 0x0, 0x0, 0xff, 0x40000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x4}, 0x608, 0x12e, 0x9, 0x0, 0x3e, 0x10000, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x8) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000140)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) socket$nl_sock_diag(0x10, 0x3, 0x4) sendfile(r2, r3, 0x0, 0x7fffffa7) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88880}, 0x10) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[], @ANYRESHEX], 0x16) [ 1257.606339][ T27] audit: type=1800 audit(1588155489.797:421): pid=2667 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=44 res=0 [ 1257.715270][ T27] audit: type=1804 audit(1588155489.837:422): pid=2670 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir610783877/syzkaller.VZCXYX/1386/file0/file0" dev="loop5" ino=44 res=1 10:18:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1258.279715][ T27] audit: type=1804 audit(1588155490.467:423): pid=2670 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir610783877/syzkaller.VZCXYX/1386/file0/file0" dev="loop5" ino=44 res=1 10:18:10 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000340)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000000, 0x0) setuid(0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000280)='fuseblk\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) tkill(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x5871cb18d4c21a2e) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x2, 0x4, 0x0, 0x0, 0xff, 0x40000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x4}, 0x608, 0x12e, 0x9, 0x0, 0x3e, 0x10000, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x8) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000140)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) socket$nl_sock_diag(0x10, 0x3, 0x4) sendfile(r2, r3, 0x0, 0x7fffffa7) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88880}, 0x10) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[], @ANYRESHEX], 0x16) [ 1258.408375][ T27] audit: type=1804 audit(1588155490.527:424): pid=2670 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir610783877/syzkaller.VZCXYX/1386/file0/file0" dev="loop5" ino=44 res=1 10:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:10 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) [ 1258.609963][ T27] audit: type=1800 audit(1588155490.797:425): pid=2704 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=46 res=0 [ 1258.708694][ T27] audit: type=1804 audit(1588155490.837:426): pid=2705 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir610783877/syzkaller.VZCXYX/1387/file0/file0" dev="loop5" ino=46 res=1 [ 1258.835484][ T27] audit: type=1804 audit(1588155490.977:427): pid=2714 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/963/bus" dev="sda1" ino=16382 res=1 [ 1259.012108][ T27] audit: type=1804 audit(1588155490.997:428): pid=2714 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/963/bus" dev="sda1" ino=16382 res=1 10:18:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e000000) 10:18:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:12 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) chdir(&(0x7f0000000040)='./file0\x00') ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r1, 0x1000008b11, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880)=0x0, &(0x7f00000008c0)) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r5}}]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000980)=[{&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000280)="f0ba8a72fda9eef92dafc2639d0a65b4aedfd5cba62c42e60fc0f7653ab57183b59439d4b5cfc05f2ea1c1b4a973bfd49a5f0950c3f994406ae3ddab78c6f7907417dcefe613de5d98c2fb11c90b501d06b370672b2fd4b70057706c05b0cb0b5bd4fe883b07e9d82b0a48f0081b080877eff5fade5e5685a8b78756e81cd2c35ee9690a1bb066fded39c00391a0c0db5b", 0x91}, {&(0x7f0000000340)="d0656d580ed8e31d3ebb8a24ff4fdbde79ef52ad021ae883df89ae18fd88213972675fed8dda85183cca6cc9c7af510ee6bdb2089950f324c237cc66e506be4c45986b0c2802f7b6c6bfe7138e5304e11b32fa5d3226854925bfdfbd9ec424d235b78d3e901304887f8dc1487f38f7492682fd8ca91f575656d3430978a623dc0802e8d0a828ffbd4aadc64d295e338a355ab373abc49ebfaf526961e47a867374f54439c37747", 0xa7}, {&(0x7f0000000400)="654de3f21d02a1875bf80948cf8bf5ade33917bcab4f2f6647e126d2816729351ce64852a49fdefdd4ef4cd96cf42b8a496804e8", 0x34}, {&(0x7f0000000440)="e7ddda688d2bd37fa1a951fb72aca528c6932f884fc94ced51d9a2f5c2749a9f94d6538d42d93b6ef44894c03ba416d352e089574f044bc3c757bbdaaeb65a254b781922b4d7cd431a99ee3c", 0x4c}, {&(0x7f00000004c0)="bb06686f3141b13d1b505f235ea5553e21c8433130920b18a407dbd1bdd6d8c1120ca067e536e505ab0941db1ac4a3b88d09db6b7cf43b0518ea504d8ee50cfdc7134f5b4e3f0b5ec93b7192cf27f62308204a872cc264209f0a52a489f698bd31f529653b5f26caa66bfc016cbad850c17c5f227b0c07c9b98c743ec1c5a471e888f156d258e7b4ce5b9932889f5f194f0494754cc4368d83433fd3f4a12ea8f81d607491e8361e728eeacbc61d1e4bcb21e4e3b0433fa6a99d0dfffc3dbcc77f0c470c7b2a42d4463e7644b104c2709ebc07fe1266fa4213e5e24eb9d1b15aad7ef16f168853a347bf", 0xea}, {&(0x7f00000005c0)="30a2cf46a70ae0e1c7bb09fc8ed2b38fd937f2610f23a3246aa5dfe94b2310de3265de49128c1026b9989a59ee14bd0dc8b071ef88c6316af0969db865e237e9007ea8277f64ae", 0x47}, {&(0x7f0000000640)="23c0362e412bf6a21da7dfb6dd8664771b8fc7034dd6b01e7f652601dc35d3574828360438412035dde1bb29e3d81fe626586b7138ab4743dd569d0252673215ed898d7e8b54709bf383bcda914900562d899849", 0x54}, {&(0x7f00000006c0)="97d92975c68169d6e066418fa3186a80e8869b4d913d94a41b8d60c74db77a177d37abe1ee089c90a681cb39db1329f9a754a67f958fa84f02eef813fff27983b030bdc4460a84c2010f09ab8b5937cf0764f7f9b51046e1f1f0f0f61ff90a6421e0c0f55f184197ef7dd864a65aa2eccf81cd1a9757ba4dbbe79345f6d69ba28983da3fe98b314f3d2481929d1f828bd88da5dc421460f00585ec3390098081624f05c5dc5373432c049101f9a3728e1651fb0709bbfe441517ea18f109f0e250c86820f9d9925d32bb3628b640b8d69bda85cd96331ee7117298885963de975e57a524ec5a", 0xe6}], 0x8, &(0x7f0000000900)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, r1, 0xffffffffffffffff, r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, r5}}}], 0x68, 0x4000}], 0x1, 0x800) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@local, @in=@empty, 0x4e21, 0x0, 0x4e20, 0x2, 0xa, 0xa0, 0x20, 0x3c, 0x0, r7}, {0x54b21c93, 0x7, 0x5bd, 0x1ff, 0x4, 0xfffffffffffffff7, 0x6, 0x1000}, {0x5, 0x9, 0x9, 0x3ff}, 0x4, 0x6e6bbb, 0x0, 0x0, 0x3, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x2, @in6=@rand_addr=' \x01\x00', 0x34ff, 0x4, 0x2, 0x2, 0x800, 0x1, 0x5}}, 0xe8) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, &(0x7f00000009c0)=0x3, 0x7fffffff) 10:18:12 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000340)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000000, 0x0) setuid(0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000280)='fuseblk\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) tkill(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x5871cb18d4c21a2e) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x2, 0x4, 0x0, 0x0, 0xff, 0x40000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x4}, 0x608, 0x12e, 0x9, 0x0, 0x3e, 0x10000, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x8) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000140)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) socket$nl_sock_diag(0x10, 0x3, 0x4) sendfile(r2, r3, 0x0, 0x7fffffa7) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88880}, 0x10) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[], @ANYRESHEX], 0x16) [ 1260.660850][ T27] audit: type=1804 audit(1588155492.857:429): pid=2741 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir610783877/syzkaller.VZCXYX/1388/file0/file0" dev="loop5" ino=48 res=1 [ 1260.696070][ T27] audit: type=1800 audit(1588155492.857:430): pid=2737 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=48 res=0 [ 1260.733047][ T27] audit: type=1804 audit(1588155492.887:431): pid=2726 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/964/bus" dev="sda1" ino=16233 res=1 10:18:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:13 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x0) timer_create(0x0, &(0x7f000049efa0), 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x2, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x44aa}, 0x0, 0x7, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000080)={0x1, {{0x2, 0x4e20, @local}}}, 0x88) socketpair(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x3000) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f00000009c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a40)="e06c74f312be5175a960a977ce4b7bb59d52ba828fa07a81e6f97365467cb9e4d4da7eccbd797e08fa066e264a1a6ab348bf128fbee503e8d78cd519a433195164f43509aa133e73b5d7a35ea7ec499d097c420300760050ecd7846fbd1082351767f5c09037552e763130717be850db4d2acc416ad9137663635cdd36031fdfbb59bb9c0e7062c008dd336ec2197e8ef72fe9d763d6f918f296b77a6bd17e4ef8eb48ab3c184b7844ec1d674d7e7fdcefe20a927a30babfcbc062223da92bea13181c3ecfc030d6ebb8201b61d790c86fbc642fd3b6e3ae885e0deac81820915aa30a4e8c73", 0xe6}], 0x1, &(0x7f0000001580)=[{0x1010, 0x110, 0x1, "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"}, {0x108, 0x101, 0x8, "3370674db717c4f4328e7d41bda23751801fb6e772725473cd7950436d2bf3643d486fbc06f22c2f63d4198c05a5d213e93608285b6adc64f7966f0b7ca4024d622069cc6ba5c5cbe5a5ffced4260337eb705da382606d9531216e50199b6b252bb572a3992fe805339bbca641613076bc715491b2234a0d19a6a1e7962ade557d9a51ffd7d45ac11f574be0bf89a7a2b5006011029cd4fb40c52f3435ab3821ce3d1459f33184e99d951109f05c46d6eea9e8ff25ecefb26bfde4672c29368e1e4af77be7e45d88c770e04b399b9b143ec3bf3d15c32ec04175c064f4f326049c37e78ba7ff5a699c7f4349fa09c0a8e616fb160d91"}, {0x28, 0x98, 0x5, "34af85f8db2e01bc595b4d59eff41b4503ed4d5ed9ac46"}, {0x58, 0x10d, 0x0, "cb4ec1ac1d1c35ca89b604e68d8ba4d7e7c8fd937bb97785af344e61d512bc74691161d901064b217eb33e7acaa307d26e056bee2a9a31fd8ef1fddcfed46c91f475"}, {0xe8, 0x102, 0x0, "6a7299018aa2fdf3fd6118897f70a466f83773da6ca3939248c983314254965138053e7c041d8693f308e7cca657a5099a78d291e8db743984e0e46855c460e5c448e2bf6b8a6ef9d38a7d686e3d63f6eec1b1891ab3fc3a6b86361875bdf5634e45f5f2573609ac0a7a539a0154740813813a2feaf3052cebc36eaefba80dcc5c6f9c2ce0d15b4d15346e60ffee0c76c0abf3dd89ccecd0b94bb60cbb82d042c7faa413eed0c6730dea2dc60a761eedddeca5a626b46b772be7cb023de6380de12df1ea733b30f59366ce7140e784d268c04317220a4e"}, {0x110, 0x3a, 0x2, "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"}], 0x1390}}], 0x1, 0x4801) write$binfmt_elf32(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4601b67f0800000000000000008502000038000000950200000800000000802000010090ff088c00fc000000000200000000000000010000008b000000000400000500000007000000ff070000708561d5f5054378e995d907a95180fe9554bd037d24855c96982645c89e6e73b308fc85ebd412ce22edfff9fc6bc5a13ca59a8ccce7ac2dfa3bbbbc1529f966d0d8f2111816da7d5edf6892636b204d9972584376e05c286240cff51832c8481205e2984cec4b70391fd97a891946962025511ec9893bfabef773e63c78722dffda0eb67c6261edef27eba187cacde2fc2a174c442453ecbfc3ca83211ede2931894000"/2291], 0x8fb) ftruncate(r1, 0x200004) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x600800, 0x0) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:13 executing program 5: [ 1261.387819][ T27] audit: type=1804 audit(1588155493.577:432): pid=2765 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/965/bus" dev="sda1" ino=16376 res=1 10:18:13 executing program 5: 10:18:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfeffffff) 10:18:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:15 executing program 5: 10:18:15 executing program 5: 10:18:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:16 executing program 5: 10:18:16 executing program 4: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./bus\x00', 0x7ff, 0x8, &(0x7f0000001580)=[{&(0x7f0000000100)="a3352ddb6f8cf4605d425fb34596ca813285c8fa38d36f15e15198fdd58466a209a099ff56d37033af3c8ff611f039f25c6b2393aebccbc4481facef6facd49a", 0x40, 0x80}, {&(0x7f0000000140)="6dfe13d9fc2bae68d262706f40249814c63754b87d6b16953db6c820ea5eb2f5f3c9d083d8cad2ba300da8a75c08f65ed8e4f1d23f1f57635b89e4e16a0ab0d2ce919edcd7f105f669", 0x49, 0x7}, {&(0x7f00000001c0)="1172d093de472e40437ff353523db16bb6f4d941d75ef69fd3364e5c3e4aa025b18d5c61c9ebb9b7f9a73e0b5b12dfca29efc57948a0e1a8225a0b46e58c51a29e45c6df605a0bf0a06332c84efc", 0x4e, 0x6}, {&(0x7f0000000240)="f100afcb2cd2f60661d2a666774de78d6a95446330f747b5ea8ea15396ba6f1eb1067a7ed4ed4b503e108483cbb52b23d969e9ddd3995861a3d22796514a799aa98705c4ceaa842d7cee8e804641f478c09b4b0c64ae7ff825115edd63e5fda804e849418ff90bb7fd2476f747a6b3bffeb4e9700e58e1b0b4e43c9ccac4c95c9ff62a1661b2cfe10099b74807c60d141cac76de3a637c34314c35aab3fe7da3d54cfdf1bfdf616175fbabc821fad78358f7c00f336481", 0xb7}, {&(0x7f0000000300)="b7ca8f1d8f4403848cbc65700fb2cad3d0891526960a189c6891ea996a6387931032f72eccdee5aefa7639ee1833fc1aac03eb6f0d4baac87759f96fd97f2cf7224a32ef903ae6e9120b1d86caa715a261f6e864370f1bf45deb3835d737db717f548e5781ff9e49412bdaff8f96056b4d66990c560fa6cc9cb04d363095f7b3e44f48778f356c14b5e10ee877049a13a8137b0473f03601a29690cb43d1184d886d99078254efac9a42544bcb628308f70de9a81d77", 0xb6, 0x101}, {&(0x7f00000003c0)="8d3c7e40303ab16b462c50c59635d59aa0492fffa896c315b8853f14b0d6463f19b7460679189971e91f48f97a6be19923aa513eeeaae5d3b98715e5be68aadbfaf60331c0ca2280a3a4a5b5cc7a1a1a0e3323e1255a450d236feb6f5a63d9824dab9b5ccf57a3b3bff9718848714e5559d32f8a5b8956c2c71904270bbca9d1d8f29d08e1d83a42a640f6ec48814c4fbfd6697872330f2e393c4fbd883cbe815679c0ed87386d5e7832a7", 0xab, 0x6}, {&(0x7f0000000480)="6b0d4550283daaa4530aa5297e5c7fb3ed47412fb01aedb22901efd4765bd7133f5b3818f2673562b297ad17901dceca99142acfa0c32d080368", 0x3a, 0x3}, {&(0x7f00000004c0)="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", 0x1000, 0x100000001}], 0x48044, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) fchmodat(r0, &(0x7f00000014c0)='./bus/file0\x00', 0x84) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000000000)=0x7ff, 0x80000000) ioctl$TUNSETLINK(r3, 0x400454cd, 0x325) 10:18:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000000ff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:16 executing program 5: 10:18:16 executing program 5: 10:18:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfffffffe) 10:18:18 executing program 5: 10:18:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000000ae", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:18 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r3, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10001}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x800) write$nbd(r2, &(0x7f0000000040)={0x67446698, 0x0, 0x4, 0x2, 0x4, "44f4682f3f7b7cbe6524812b3f225eabb8f3dc"}, 0x23) r4 = socket(0x2000000000010, 0x80000000002, 0x0) write(r4, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)={0x18, r5, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb0, r5, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0xb0}}, 0x40004) ftruncate(r1, 0x200004) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:18 executing program 5: [ 1266.583653][ T2830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2830 comm=syz-executor.4 [ 1266.624683][ T27] audit: type=1804 audit(1588155498.817:433): pid=2830 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/967/bus" dev="sda1" ino=16231 res=1 10:18:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:19 executing program 5: 10:18:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000000ff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:19 executing program 5: 10:18:19 executing program 5: 10:18:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000000ff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x100000000000000) 10:18:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}}) 10:18:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000000ff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:21 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x101844, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r4 = socket(0x2000000000010, 0x80000000002, 0x0) write(r4, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f00000000c0)=0x1722) 10:18:21 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f00000000c0)={0xa00000, 0x6f0293a1, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980918, 0x9, [], @value64=0xffffffff}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') write$selinux_attr(0xffffffffffffffff, &(0x7f00000002c0)='system_u:object_r:fonts_cache_t:s0\x00', 0x23) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000d6d43ddffa06e338e0c7cb418283d2acab4a18af358d1a2a440a801702e6875f2da6087cf393e65fd1c3974400132451e8b69d5e48f90c14c7ece9391d9195374405381e585223ce4a69ef9f9edab4e814641ac17b5f0c58fde307d4d6e66c939f8d1c03b28aa6d1420d1d03c0cf444c5580206349ca847d5d83d225e38afa6a19b04552b3446cefe0af0094f4841750cd79511300c61beb4168ef2b72bb64085da7f118ef553b57ab01580d6b2091b955acf720691c98738dccb65814720430256b52db2241c243bc1e64deaccf230db3a3027f2539a0a281a1dea9602c6a8c"], 0x48}}, 0x0) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200041, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r10, 0x4040ae70, &(0x7f0000000280)={0xffffffff, 0x3, 0x0, 0xa02}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c002000", @ANYRES16=r6, @ANYBLOB="b7230000000000000000070000f008000300", @ANYRES32=r9, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="7400870066e93060fc45eba95374e634335f9b6c5b6667a87b3e464f24a3056be8a6fed81612d885051abdd3e4bf0401", @ANYRES16=r6, @ANYBLOB="00032dbd7000fcdbdf250c000000080031000400000008003c0002000000050035000800000008003c00ff0f000005002a0000000000080039006298000008003b00060000000500350005000000"], 0x54}, 0x1, 0x0, 0x0, 0x40041}, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1269.653052][ T27] audit: type=1804 audit(1588155501.848:434): pid=2869 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/968/bus" dev="sda1" ino=15956 res=1 [ 1269.785781][ T27] audit: type=1804 audit(1588155501.958:435): pid=2882 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/969/bus" dev="sda1" ino=15970 res=1 10:18:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000000007f", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:22 executing program 5: 10:18:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:22 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) mmap$dsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4000010, r1, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x400000, 0x0) ftruncate(r2, 0x200004) r3 = socket$inet6(0xa, 0x3, 0xdf) r4 = socket$inet6(0xa, 0x3, 0xdf) ioctl$SNDCTL_DSP_SETFMT(r1, 0xc0045005, &(0x7f0000000380)=0x8) ioctl(r4, 0x1000008b11, &(0x7f0000000000)) connect$inet6(r4, &(0x7f0000000340)={0xa, 0x4e20, 0x4, @mcast1, 0x8001}, 0x1c) ioctl(r3, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x5}}, [0x3, 0xfffffffffffffff7, 0x4, 0xfffffffffffffff7, 0x728, 0x8, 0x4, 0x3f, 0x5, 0xfffffffffffff98e, 0xc215, 0x3ab, 0x2, 0xfffffffffffffe00, 0x80000001]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r5, 0x7}, &(0x7f00000002c0)=0x8) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r7 = socket(0x3, 0x80000000002, 0x0) write(r7, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) bind$vsock_stream(r7, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) sendfile(r0, r6, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000000ff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:22 executing program 5: 10:18:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe00000000000000) 10:18:24 executing program 5: 10:18:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00f0ffffff", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:24 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x5a9d03, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x4) r5 = socket(0x2000000000010, 0x80000000002, 0x0) write(r5, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) connect$netrom(r5, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 10:18:24 executing program 5: [ 1272.745587][ T2937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=2937 comm=syz-executor.4 [ 1272.770849][ T27] audit: type=1804 audit(1588155504.958:436): pid=2937 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/971/bus" dev="sda1" ino=15862 res=1 10:18:25 executing program 5: [ 1272.828062][ T2940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=2940 comm=syz-executor.4 [ 1272.864655][ T27] audit: type=1804 audit(1588155505.058:437): pid=2937 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/971/bus" dev="sda1" ino=15862 res=1 10:18:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0002000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:25 executing program 5: 10:18:25 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d9, 0x8, [], @string=&(0x7f0000000040)=0x80}}) bind$rxrpc(r2, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0xffffff9c, @empty, 0x9}}, 0x24) r3 = getpgid(0x0) ioprio_get$pid(0x2, r3) ftruncate(r1, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) ioctl$VIDIOC_G_CROP(r4, 0xc014563b, &(0x7f0000000180)={0xc, {0x1, 0x7, 0x401, 0x7ff}}) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:25 executing program 5: 10:18:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3f00000000000000) 10:18:27 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x4, @empty, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ftruncate(r2, 0x200004) r3 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x9, 0x80000) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="0000000000000000000000000090010001000000", @ANYRES32=r3, @ANYBLOB="000000230000000000000100ff00000000000000"]) mlockall(0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x10003, 0x0, 0x10e000, 0x1000, &(0x7f00009a0000/0x1000)=nil}) socket$l2tp(0x2, 0x2, 0x73) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:27 executing program 5: 10:18:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0003000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:27 executing program 5: 10:18:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0004000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1276.222835][ T27] audit: type=1804 audit(1588155508.418:438): pid=2978 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/973/bus" dev="sda1" ino=16246 res=1 10:18:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:28 executing program 5: 10:18:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:28 executing program 5: 10:18:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0006000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1277.317766][ T27] audit: type=1804 audit(1588155509.508:439): pid=2978 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/973/bus" dev="sda1" ino=16246 res=1 10:18:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e00000000000000) 10:18:30 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x40000003, 0x0) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000040)={0x4, 0x9, 0x4, 0x20, 0x101, {0x0, 0x2710}, {0x7, 0x0, 0x0, 0x4, 0x5, 0xb9, "214e011b"}, 0x0, 0x2, @planes=&(0x7f0000000000)={0x0, 0x3, @userptr=0x100000000, 0x8}, 0x8}) 10:18:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0008000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:30 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = socket(0x2000000000010, 0x80000000002, 0x0) write(r2, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) setsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000040)=0x8, 0x4) ftruncate(r1, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000000)={0x9, @remote={[], 0x3}}, 0x12) [ 1278.800232][ T27] audit: type=1804 audit(1588155510.998:440): pid=3019 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/974/bus" dev="sda1" ino=16246 res=1 10:18:31 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, 0x0) 10:18:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0009000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x1, 0x2, 0x201}, 0x14}}, 0x0) 10:18:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x6, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 10:18:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @private1}, {0x2, 0x0, 0xffffffbe, @local}, r1}}, 0x48) 10:18:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x8000000000000000) 10:18:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000a000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:34 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) ftruncate(0xffffffffffffffff, 0x200004) r1 = open(&(0x7f0000000080)='./bus\x00', 0xda000, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:34 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000040)={0x0, 0xfffffffffffff3d9, 0x4, 0x8, &(0x7f0000ffd000/0x2000)=nil, 0x1}) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000b000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1281.986395][ T27] audit: type=1804 audit(1588155514.179:441): pid=3076 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/976/bus" dev="sda1" ino=16286 res=1 10:18:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000c000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000e000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfeffffff00000000) 10:18:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c000f000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0010000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:37 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x6) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) [ 1285.103616][ T27] audit: type=1804 audit(1588155517.299:442): pid=3121 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/977/bus" dev="sda1" ino=15798 res=1 10:18:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 10:18:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0011000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 10:18:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xffffffff00000000) 10:18:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 10:18:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0012000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 10:18:40 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = socket(0x2000000000010, 0x80000000002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0xc0, 0x0) write(r3, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) getpeername$l2tp(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'wg0\x00', &(0x7f0000000100)=@ethtool_rxfh_indir={0x39, 0xa, [0x9, 0xffff1b0f, 0x800, 0x8000, 0x1, 0x10000, 0x1, 0x400, 0x0, 0x4]}}) 10:18:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) [ 1288.155271][ T27] audit: type=1804 audit(1588155520.349:443): pid=3167 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/978/bus" dev="sda1" ino=16286 res=1 10:18:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0013000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:40 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:40 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:40 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x10000, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000d6d43ddffa06e338e0c7cb418283d2acab4a18af358d1a2a440a801702e6875f2da6087cf393e65fd1c3974400132451e8b69d5e48f90c14c7ece9391d9195374405381e585223ce4a69ef9f9edab4e814641ac17b5f0c58fde307d4d6e66c939f8d1c03b28aa6d1420d1d03c0cf444c5580206349ca847d5d83d225e38afa6a19b04552b3446cefe0af0094f4841750cd79511300c61beb4168ef2b72bb64085da7f118ef553b57ab01580d6b2091b955acf720691c98738dccb65814720430256b52db2241c243bc1e64deaccf230db3a3027f2539a0a281a1dea9602c6a8c"], 0x48}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)={0x1c, r2, 0x31905e13403123b7, 0x0, 0x0, {0x7, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x10) 10:18:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0014000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:43 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:43 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 10:18:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0060000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:43 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 10:18:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:43 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) r3 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r3, 0x1000008b11, &(0x7f0000000000)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r6}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e21, 0x3f, @mcast1, 0xfffffff7}}, 0x20, 0x7f, 0x4, 0x1ff, 0x2, 0xffffffff}, &(0x7f0000000200)=0x9c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r7, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r7, 0xc02064b9, &(0x7f0000000100)={&(0x7f0000000040)=[0x584, 0x5, 0x7, 0xac], &(0x7f00000000c0)=[0x0, 0x0], 0x4, 0x5, 0xeeeeeeee}) 10:18:43 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 10:18:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00f0000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1291.734316][ T27] audit: type=1804 audit(1588155523.929:444): pid=3216 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/979/bus" dev="sda1" ino=16301 res=1 10:18:44 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 10:18:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x27) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000030000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:46 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 10:18:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfffffffffffffffd) 10:18:46 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 10:18:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000050000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:46 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 10:18:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000060000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:46 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x7, 0x79000000}, 0xc) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = socket$inet6(0xa, 0x1, 0x27) ioctl(r1, 0x1000008b11, &(0x7f0000000000)) getsockname$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x6) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) 10:18:47 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) [ 1294.910651][ T27] audit: type=1804 audit(1588155527.109:445): pid=3273 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/980/bus" dev="sda1" ino=16231 res=1 10:18:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="f7154ec80aa4cefd3b79e76a039a00001c34f13ff7703cc7990e33a6cfce3013376fd28e402a20c67dbe3ec9ee6c17fc767be5025d00ebe5cac2d724bc8baf11d4f3259c0ee00a81cb3000495ae1841ea0c40133596b9e22ab5af4c0629ed55a81d703000000285c08367a4a75ffab4f6f10a04f31c7c8d0cfc58b1185e9389716678675fa846a9ffae3c6985a4b2f24f9eff773d9504cc31bcd27398561935bb71c16ebb8874e2035c7bb2a2f860be31b7f6ceb478c3e7ffaeda7615b4911ebc99c7c80e6e275c521c8921d67e6c2cb9f293e0000000000000000006f55d681b553d32fe63676b04dd25d30a549a1722fb6e8ce0c55c6a627acc692b370abdd8235ba69f7af9df92387466a7d066949b04d3acbbe9db429624be18c86dcc8f4d6ac0e77d57160a89357ce7eefaf5e761bb3caf361559218d5941e3fc379dd25d5907244ed6272faf506e1aa7f6b77c93019e94352833aba0bb36099eb9f6876014fb5fd0fc0786e8d42092fd0aa17779354b0a153508d2758f2bbcfa349af5c0e34c41ebb9dc79f378626f37808432459f2b6145f17c39695faec958e8af8f73c58000000000000"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0073080000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:47 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 10:18:47 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x90000, 0x28) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x0, 0x20, 0x3, 0x61}, {0xeb61, 0xff, 0x7, 0x1f}, {0x1, 0xe3, 0x3, 0x401}]}) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x6) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1295.023557][ T27] audit: type=1804 audit(1588155527.219:446): pid=3273 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/980/bus" dev="sda1" ino=16231 res=1 10:18:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="9f"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001f00)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xc}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 10:18:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000090000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:49 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = memfd_create(&(0x7f0000000040)='m\x815>\a\x00\xc2(\xa4\xc6r\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8000) lseek(r1, 0x0, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141043, 0x0) ftruncate(r2, 0x200004) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000)=0x7ff, 0x80000000) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 10:18:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$setregs(0xd, r0, 0x8001, &(0x7f0000000200)="e2b2a9d6e9b8211f7495d892928723ef6717c3f71067644811573b9dba379068cd2b04") clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000140)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}], 0x3, 0x0, 0xffffffffffffffd1, 0x0) tkill(r1, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) 10:18:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000640)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000880200000000000000000000f8000000f8000000f8000000f0010000f0010000f0010000f0010000f0010000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000048000000009800f8000000000000000000000000000000000000000000280061646472747970650000000000000000000000000000000000000000000100000000000000006000534554000000000000000000000000000000000000000000000000000000ffff000000000000000000000000000000000000000000000000000000000000ffff000004000000050000000000000000000000000000000000000000000000ac1414bb7f00000100000000000000000000000000000000000000000000000073797a5f74756e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000600008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) 10:18:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000a0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:50 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0xe8901, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r2}}]}) getresgid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r5}}]}) r6 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r7}}]}) r8 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r9}}]}) setgroups(0x5, &(0x7f0000000140)=[r2, r3, r5, r7, r9]) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x200004) r11 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r11, &(0x7f0000000000)=0x7ff, 0x80000000) [ 1297.831600][ T3312] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 1297.860741][ T3317] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 1297.929962][ T27] audit: type=1804 audit(1588155530.130:447): pid=3313 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/983/bus" dev="sda1" ino=16376 res=1 10:18:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') lseek(r0, 0x1000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socket$inet6(0xa, 0x0, 0x3c) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) epoll_create1(0x0) 10:18:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000b0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000c0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:50 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x3, 0x2) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) getxattr(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000400)=""/84, 0x54) 10:18:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x1e, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="8f53768adb4b8307f30ae5d61b9caa00994a86d716d62fff05d2d7451e9f515b7211b98a2c3086f6d92ea7c7913608866d785ece8ed7434dd6f950a8884f5864f80e5db0068214adb29854d51f9da66937a4ef8c1d09448a0bf680e9e0b49f2f5861e3c6b094f6abf88d7386ca085de410e6cbee039a476b68507a724601c49d2385b8d7436150e110260f208fb3065c227448c6dc2b6b572934573d238bc2e7bdc6a88464153453434700eaca9d51fc1a2f32460ba8fe3bc3f419961091607ecec69fe249040f40dc8cc15fe729f1addbaf23bb5388c393c32019d6ebcea28bc712a0567587e0db7f6fdbd1435e876c", 0xf0}, {&(0x7f0000000000)="8ca99b74a08bdffdcacbc6596cdeac64021c892b77523c865223d19f93c2e555d8939ab0d68533330eb3da55669e2a69e75f42f817d03a3e08c63f9eed1374f6ac70adf914d0639eedc2d9fde13db0edd534a527ae41d00545bbf69ec014e9a0e3281805def4a7884a3cc7127ea5b4b4bc83d75979bb57de121c1a33dcfb1a14f4ae4e020434fb7c2027c00be69b0bcea4", 0x91}], 0x2) 10:18:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000e0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:53 executing program 5: syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 10:18:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00000f0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xffffffffffffff79}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000200)=""/119) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x0, 0x7}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000000)={0x8, 'veth0\x00', {'veth1\x00'}, 0x2b}) 10:18:53 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x7ff, 0x80000000) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000180)) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) fcntl$setown(r3, 0x8, r4) [ 1300.969912][ T27] audit: type=1804 audit(1588155533.170:448): pid=3385 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/984/bus" dev="sda1" ino=16256 res=1 10:18:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:53 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001840)='/dev/null\x00', 0x8042, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 10:18:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000110000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1301.185326][ T27] audit: type=1804 audit(1588155533.380:449): pid=3385 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459070363/syzkaller.QiKRnt/984/bus" dev="sda1" ino=16256 res=1 10:18:53 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) close(r0) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/36, 0x24) 10:18:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000120000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4001, 0x0) write$cgroup_int(r0, 0x0, 0x0) 10:18:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) write$eventfd(r0, 0x0, 0x0) 10:18:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0004000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000130000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) connect$pppoe(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) r1 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r1, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) r3 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r4}}]}) fchown(0xffffffffffffffff, r2, r4) ptrace$setregs(0x2, r0, 0x1, &(0x7f0000000200)="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") ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:56 executing program 4 (fault-call:2 fault-nth:0): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:56 executing program 5 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 10:18:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000140000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1304.135623][ T3448] FAULT_INJECTION: forcing a failure. [ 1304.135623][ T3448] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.199489][ T3448] CPU: 0 PID: 3448 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1304.208114][ T3448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.218174][ T3448] Call Trace: [ 1304.219386][ T3460] FAULT_INJECTION: forcing a failure. [ 1304.219386][ T3460] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.221471][ T3448] dump_stack+0x188/0x20d [ 1304.221496][ T3448] should_fail.cold+0x5/0xa [ 1304.221514][ T3448] ? lock_downgrade+0x840/0x840 [ 1304.221537][ T3448] ? fault_create_debugfs_attr+0x140/0x140 [ 1304.253584][ T3448] should_failslab+0x5/0xf [ 1304.258009][ T3448] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1304.263396][ T3448] ? __lock_acquire+0xcbb/0x4c50 [ 1304.268344][ T3448] alloc_pipe_info+0x10a/0x4f0 [ 1304.273116][ T3448] splice_direct_to_actor+0x777/0x980 [ 1304.278488][ T3448] ? __inode_security_revalidate+0xf0/0x140 [ 1304.284390][ T3448] ? avc_policy_seqno+0x9/0x70 [ 1304.289162][ T3448] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1304.294715][ T3448] ? lock_downgrade+0x840/0x840 [ 1304.299566][ T3448] ? do_splice_to+0x160/0x160 [ 1304.304251][ T3448] do_splice_direct+0x1b4/0x280 [ 1304.309137][ T3448] ? splice_direct_to_actor+0x980/0x980 [ 1304.314712][ T3448] do_sendfile+0x555/0xc50 [ 1304.319140][ T3448] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1304.324431][ T3448] ? wait_for_completion+0x270/0x270 [ 1304.329715][ T3448] ? __sb_end_write+0x101/0x1d0 [ 1304.334567][ T3448] ? vfs_write+0x161/0x5d0 [ 1304.338995][ T3448] __x64_sys_sendfile64+0x1cc/0x210 [ 1304.344199][ T3448] ? ksys_write+0x1a5/0x250 [ 1304.348707][ T3448] ? __ia32_sys_sendfile+0x220/0x220 [ 1304.353996][ T3448] ? __ia32_sys_clock_settime+0x260/0x260 [ 1304.360331][ T3448] ? trace_hardirqs_off_caller+0x55/0x230 [ 1304.366069][ T3448] do_syscall_64+0xf6/0x7d0 [ 1304.370585][ T3448] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1304.376486][ T3448] RIP: 0033:0x45c829 [ 1304.380475][ T3448] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1304.400087][ T3448] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1304.408502][ T3448] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1304.416481][ T3448] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1304.424461][ T3448] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1304.432427][ T3448] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1304.440396][ T3448] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 [ 1304.459071][ T3460] CPU: 1 PID: 3460 Comm: syz-executor.5 Not tainted 5.7.0-rc3-syzkaller #0 [ 1304.467681][ T3460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.477734][ T3460] Call Trace: [ 1304.481032][ T3460] dump_stack+0x188/0x20d [ 1304.485376][ T3460] should_fail.cold+0x5/0xa [ 1304.489889][ T3460] ? lock_downgrade+0x840/0x840 [ 1304.494752][ T3460] ? fault_create_debugfs_attr+0x140/0x140 [ 1304.500578][ T3460] should_failslab+0x5/0xf [ 1304.505002][ T3460] kmem_cache_alloc+0x29b/0x740 [ 1304.509864][ T3460] ? find_held_lock+0x2d/0x110 [ 1304.514637][ T3460] getname_flags+0xd2/0x5b0 [ 1304.519153][ T3460] user_path_at_empty+0x2a/0x50 [ 1304.524038][ T3460] user_statfs+0x86/0x130 [ 1304.528381][ T3460] ? vfs_statfs+0x2c0/0x2c0 [ 1304.532903][ T3460] ? __mutex_unlock_slowpath+0xe2/0x660 [ 1304.538475][ T3460] __do_sys_statfs+0x7a/0xf0 [ 1304.543078][ T3460] ? user_statfs+0x130/0x130 [ 1304.547682][ T3460] ? vfs_write+0x161/0x5d0 [ 1304.552079][ T3460] ? fput_many+0x2f/0x1a0 [ 1304.556403][ T3460] ? ksys_write+0x1a5/0x250 [ 1304.560928][ T3460] ? __ia32_sys_read+0xb0/0xb0 [ 1304.565680][ T3460] ? __ia32_sys_clock_settime+0x260/0x260 [ 1304.571380][ T3460] ? trace_hardirqs_off_caller+0x55/0x230 [ 1304.577080][ T3460] ? do_syscall_64+0x21/0x7d0 [ 1304.581746][ T3460] do_syscall_64+0xf6/0x7d0 [ 1304.586348][ T3460] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1304.592214][ T3460] RIP: 0033:0x45c829 [ 1304.596184][ T3460] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1304.615765][ T3460] RSP: 002b:00007fb27cf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 1304.624163][ T3460] RAX: ffffffffffffffda RBX: 0000000000507440 RCX: 000000000045c829 [ 1304.632124][ T3460] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 1304.640171][ T3460] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1304.648132][ T3460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 10:18:56 executing program 4 (fault-call:2 fault-nth:1): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1304.656105][ T3460] R13: 0000000000000ba6 R14: 00000000004c36f4 R15: 00007fb27cf606d4 10:18:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 1304.701041][ T3472] FAULT_INJECTION: forcing a failure. [ 1304.701041][ T3472] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.715974][ T3472] CPU: 1 PID: 3472 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1304.724578][ T3472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.734637][ T3472] Call Trace: [ 1304.737942][ T3472] dump_stack+0x188/0x20d [ 1304.742295][ T3472] should_fail.cold+0x5/0xa [ 1304.746810][ T3472] ? lock_downgrade+0x840/0x840 [ 1304.751678][ T3472] ? fault_create_debugfs_attr+0x140/0x140 [ 1304.757504][ T3472] should_failslab+0x5/0xf [ 1304.761926][ T3472] __kmalloc+0x2d9/0x7a0 [ 1304.766172][ T3472] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1304.771730][ T3472] ? alloc_pipe_info+0x1e0/0x4f0 [ 1304.776686][ T3472] ? __lock_acquire+0xcbb/0x4c50 [ 1304.781659][ T3472] alloc_pipe_info+0x1e0/0x4f0 [ 1304.786453][ T3472] splice_direct_to_actor+0x777/0x980 [ 1304.791859][ T3472] ? __inode_security_revalidate+0xf0/0x140 [ 1304.797763][ T3472] ? avc_policy_seqno+0x9/0x70 [ 1304.802537][ T3472] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1304.808090][ T3472] ? lock_downgrade+0x840/0x840 [ 1304.812953][ T3472] ? do_splice_to+0x160/0x160 [ 1304.817653][ T3472] do_splice_direct+0x1b4/0x280 [ 1304.822518][ T3472] ? splice_direct_to_actor+0x980/0x980 [ 1304.828176][ T3472] do_sendfile+0x555/0xc50 [ 1304.832614][ T3472] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1304.837914][ T3472] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1304.843472][ T3472] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1304.849457][ T3472] ? vfs_write+0x161/0x5d0 [ 1304.853890][ T3472] __x64_sys_sendfile64+0x1cc/0x210 [ 1304.859111][ T3472] ? switch_fpu_return+0x1db/0x4b0 [ 1304.864242][ T3472] ? __ia32_sys_sendfile+0x220/0x220 [ 1304.869534][ T3472] ? __ia32_sys_clock_settime+0x260/0x260 [ 1304.875257][ T3472] ? trace_hardirqs_off_caller+0x55/0x230 [ 1304.880994][ T3472] do_syscall_64+0xf6/0x7d0 [ 1304.885512][ T3472] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1304.891409][ T3472] RIP: 0033:0x45c829 [ 1304.895307][ T3472] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1304.914912][ T3472] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1304.923336][ T3472] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1304.931315][ T3472] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1304.939293][ T3472] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1304.947278][ T3472] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1304.955267][ T3472] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:18:57 executing program 4 (fault-call:2 fault-nth:2): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) [ 1305.084757][ T3486] FAULT_INJECTION: forcing a failure. [ 1305.084757][ T3486] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.104052][ T3486] CPU: 1 PID: 3486 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1305.112668][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.122731][ T3486] Call Trace: [ 1305.126048][ T3486] dump_stack+0x188/0x20d [ 1305.130408][ T3486] should_fail.cold+0x5/0xa [ 1305.135362][ T3486] ? lock_downgrade+0x840/0x840 [ 1305.140238][ T3486] ? fault_create_debugfs_attr+0x140/0x140 [ 1305.146098][ T3486] should_failslab+0x5/0xf [ 1305.150524][ T3486] kmem_cache_alloc_node_trace+0x27c/0x790 [ 1305.156469][ T3486] ? is_bpf_text_address+0xcb/0x160 [ 1305.161689][ T3486] __kmalloc_node+0x38/0x60 [ 1305.166203][ T3486] kvmalloc_node+0x61/0xf0 [ 1305.170631][ T3486] iov_iter_get_pages_alloc+0x841/0x1420 [ 1305.176279][ T3486] ? iov_iter_for_each_range+0x750/0x750 [ 1305.181985][ T3486] ? stack_trace_consume_entry+0x160/0x160 [ 1305.187828][ T3486] ? stack_trace_consume_entry+0x160/0x160 [ 1305.193735][ T3486] default_file_splice_read+0x1d5/0xa20 [ 1305.199292][ T3486] ? save_stack+0x32/0x40 [ 1305.203624][ T3486] ? save_stack+0x1b/0x40 [ 1305.207958][ T3486] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1305.213766][ T3486] ? __kmalloc+0x161/0x7a0 [ 1305.218197][ T3486] ? do_splice_direct+0x1b4/0x280 [ 1305.223229][ T3486] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1305.229385][ T3486] ? do_syscall_64+0xf6/0x7d0 [ 1305.234076][ T3486] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1305.240151][ T3486] ? iter_file_splice_write+0xb00/0xb00 [ 1305.245705][ T3486] ? mark_held_locks+0xe0/0xe0 [ 1305.250483][ T3486] ? mark_held_locks+0xe0/0xe0 [ 1305.255254][ T3486] ? lock_downgrade+0x840/0x840 [ 1305.260114][ T3486] ? mark_lock+0x12b/0xf10 [ 1305.264537][ T3486] ? mark_lock+0x12b/0xf10 [ 1305.268965][ T3486] ? find_held_lock+0x2d/0x110 [ 1305.274664][ T3486] ? fsnotify+0x7df/0xb50 [ 1305.279002][ T3486] ? fsnotify_parent+0xbf/0x2d0 [ 1305.283860][ T3486] ? fsnotify_first_mark+0x200/0x200 [ 1305.289149][ T3486] ? avc_policy_seqno+0x9/0x70 [ 1305.293914][ T3486] ? selinux_file_permission+0x92/0x560 [ 1305.299479][ T3486] ? security_file_permission+0x8c/0x470 [ 1305.305120][ T3486] ? iter_file_splice_write+0xb00/0xb00 [ 1305.310675][ T3486] do_splice_to+0x114/0x160 [ 1305.315187][ T3486] splice_direct_to_actor+0x307/0x980 [ 1305.320571][ T3486] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1305.326124][ T3486] ? do_splice_to+0x160/0x160 [ 1305.330816][ T3486] do_splice_direct+0x1b4/0x280 [ 1305.335674][ T3486] ? splice_direct_to_actor+0x980/0x980 [ 1305.341244][ T3486] do_sendfile+0x555/0xc50 [ 1305.345679][ T3486] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1305.350971][ T3486] ? wait_for_completion+0x270/0x270 [ 1305.356258][ T3486] ? __sb_end_write+0x101/0x1d0 [ 1305.361116][ T3486] ? vfs_write+0x161/0x5d0 [ 1305.365543][ T3486] __x64_sys_sendfile64+0x1cc/0x210 [ 1305.370746][ T3486] ? ksys_write+0x1a5/0x250 [ 1305.375255][ T3486] ? __ia32_sys_sendfile+0x220/0x220 [ 1305.380543][ T3486] ? __ia32_sys_clock_settime+0x260/0x260 [ 1305.386263][ T3486] ? trace_hardirqs_off_caller+0x55/0x230 [ 1305.391975][ T3486] do_syscall_64+0xf6/0x7d0 [ 1305.396462][ T3486] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1305.402336][ T3486] RIP: 0033:0x45c829 [ 1305.406563][ T3486] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1305.426200][ T3486] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1305.434587][ T3486] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1305.442559][ T3486] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1305.450508][ T3486] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1305.458476][ T3486] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1305.466424][ T3486] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:18:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c00003f0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:18:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='roUp_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0xdf) ioctl(r1, 0x1000008b11, &(0x7f0000000000)) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000080)=""/172, &(0x7f0000000180)=0xac) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 10:18:59 executing program 4 (fault-call:2 fault-nth:3): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0xcb804900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1307.066581][ T3508] FAULT_INJECTION: forcing a failure. [ 1307.066581][ T3508] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1307.093872][ T3512] fuse: Bad value for 'user_id' [ 1307.093909][ T3509] IPVS: ftp: loaded support on port[0] = 21 [ 1307.121616][ T3522] fuse: Bad value for 'user_id' [ 1307.124911][ T3508] CPU: 1 PID: 3508 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1307.135892][ T3508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.145952][ T3508] Call Trace: [ 1307.149259][ T3508] dump_stack+0x188/0x20d [ 1307.153611][ T3508] should_fail.cold+0x5/0xa [ 1307.158139][ T3508] ? do_splice_direct+0x1b4/0x280 [ 1307.163181][ T3508] ? fault_create_debugfs_attr+0x140/0x140 [ 1307.169010][ T3508] __alloc_pages_nodemask+0x17a/0x810 [ 1307.174399][ T3508] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1307.181463][ T3508] ? __kmalloc_node+0x38/0x60 [ 1307.186762][ T3508] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1307.192589][ T3508] alloc_pages_current+0xff/0x200 [ 1307.197629][ T3508] push_pipe+0x2af/0x690 [ 1307.201910][ T3508] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1307.207588][ T3508] ? iov_iter_for_each_range+0x750/0x750 [ 1307.213230][ T3508] ? stack_trace_consume_entry+0x160/0x160 [ 1307.219053][ T3508] default_file_splice_read+0x1d5/0xa20 [ 1307.224602][ T3508] ? save_stack+0x32/0x40 [ 1307.228936][ T3508] ? save_stack+0x1b/0x40 [ 1307.233273][ T3508] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1307.239078][ T3508] ? __kmalloc+0x161/0x7a0 [ 1307.243500][ T3508] ? do_splice_direct+0x1b4/0x280 [ 1307.248620][ T3508] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1307.254036][ T3508] ? do_syscall_64+0xf6/0x7d0 [ 1307.258750][ T3508] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1307.264997][ T3508] ? iter_file_splice_write+0xb00/0xb00 [ 1307.270545][ T3508] ? mark_held_locks+0xe0/0xe0 [ 1307.275313][ T3508] ? mark_held_locks+0xe0/0xe0 [ 1307.280053][ T3508] ? lock_downgrade+0x840/0x840 [ 1307.284879][ T3508] ? mark_lock+0x12b/0xf10 [ 1307.289328][ T3508] ? mark_lock+0x12b/0xf10 [ 1307.293783][ T3508] ? find_held_lock+0x2d/0x110 [ 1307.298527][ T3508] ? fsnotify+0x7df/0xb50 [ 1307.302896][ T3508] ? fsnotify_parent+0xbf/0x2d0 [ 1307.307727][ T3508] ? fsnotify_first_mark+0x200/0x200 [ 1307.313006][ T3508] ? avc_policy_seqno+0x9/0x70 [ 1307.317748][ T3508] ? selinux_file_permission+0x92/0x560 [ 1307.323287][ T3508] ? security_file_permission+0x8c/0x470 [ 1307.328925][ T3508] ? iter_file_splice_write+0xb00/0xb00 [ 1307.334465][ T3508] do_splice_to+0x114/0x160 [ 1307.338975][ T3508] splice_direct_to_actor+0x307/0x980 [ 1307.344350][ T3508] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1307.349885][ T3508] ? do_splice_to+0x160/0x160 [ 1307.354554][ T3508] do_splice_direct+0x1b4/0x280 [ 1307.359383][ T3508] ? splice_direct_to_actor+0x980/0x980 [ 1307.364916][ T3508] do_sendfile+0x555/0xc50 [ 1307.369313][ T3508] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1307.374587][ T3508] ? wait_for_completion+0x270/0x270 [ 1307.379861][ T3508] ? __sb_end_write+0x101/0x1d0 [ 1307.384686][ T3508] ? vfs_write+0x161/0x5d0 [ 1307.389078][ T3508] __x64_sys_sendfile64+0x1cc/0x210 [ 1307.394277][ T3508] ? ksys_write+0x1a5/0x250 [ 1307.398756][ T3508] ? __ia32_sys_sendfile+0x220/0x220 [ 1307.404023][ T3508] ? __ia32_sys_clock_settime+0x260/0x260 [ 1307.409741][ T3508] ? trace_hardirqs_off_caller+0x55/0x230 [ 1307.415455][ T3508] do_syscall_64+0xf6/0x7d0 [ 1307.419941][ T3508] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1307.425860][ T3508] RIP: 0033:0x45c829 [ 1307.429751][ T3508] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.449362][ T3508] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1307.457778][ T3508] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 10:18:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) [ 1307.465736][ T3508] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1307.473689][ T3508] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1307.481656][ T3508] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1307.489611][ T3508] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:18:59 executing program 4 (fault-call:2 fault-nth:4): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:18:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0065580000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1307.632177][ T3566] FAULT_INJECTION: forcing a failure. [ 1307.632177][ T3566] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1307.673514][ T3566] CPU: 1 PID: 3566 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1307.682142][ T3566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.692201][ T3566] Call Trace: [ 1307.695504][ T3566] dump_stack+0x188/0x20d [ 1307.699851][ T3566] should_fail.cold+0x5/0xa [ 1307.704366][ T3566] ? fault_create_debugfs_attr+0x140/0x140 [ 1307.710193][ T3566] __alloc_pages_nodemask+0x17a/0x810 [ 1307.715580][ T3566] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1307.722351][ T3566] ? __kmalloc_node+0x38/0x60 [ 1307.727055][ T3566] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1307.732887][ T3566] alloc_pages_current+0xff/0x200 [ 1307.737930][ T3566] push_pipe+0x2af/0x690 [ 1307.742199][ T3566] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1307.747857][ T3566] ? iov_iter_for_each_range+0x750/0x750 [ 1307.754542][ T3566] ? stack_trace_consume_entry+0x160/0x160 [ 1307.760367][ T3566] default_file_splice_read+0x1d5/0xa20 [ 1307.765914][ T3566] ? save_stack+0x32/0x40 [ 1307.770246][ T3566] ? save_stack+0x1b/0x40 [ 1307.774585][ T3566] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1307.780395][ T3566] ? __kmalloc+0x161/0x7a0 [ 1307.784910][ T3566] ? do_splice_direct+0x1b4/0x280 [ 1307.789956][ T3566] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1307.795352][ T3566] ? do_syscall_64+0xf6/0x7d0 [ 1307.800314][ T3566] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1307.806402][ T3566] ? iter_file_splice_write+0xb00/0xb00 [ 1307.812136][ T3566] ? mark_held_locks+0xe0/0xe0 [ 1307.816936][ T3566] ? mark_held_locks+0xe0/0xe0 [ 1307.821713][ T3566] ? lock_downgrade+0x840/0x840 [ 1307.826584][ T3566] ? mark_lock+0x12b/0xf10 [ 1307.831363][ T3566] ? mark_lock+0x12b/0xf10 [ 1307.835799][ T3566] ? find_held_lock+0x2d/0x110 [ 1307.840570][ T3566] ? fsnotify+0x7df/0xb50 [ 1307.844913][ T3566] ? fsnotify_parent+0xbf/0x2d0 [ 1307.849776][ T3566] ? fsnotify_first_mark+0x200/0x200 [ 1307.855073][ T3566] ? avc_policy_seqno+0x9/0x70 [ 1307.859846][ T3566] ? selinux_file_permission+0x92/0x560 [ 1307.865410][ T3566] ? security_file_permission+0x8c/0x470 10:19:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a8, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1307.871085][ T3566] ? iter_file_splice_write+0xb00/0xb00 [ 1307.876642][ T3566] do_splice_to+0x114/0x160 [ 1307.881244][ T3566] splice_direct_to_actor+0x307/0x980 [ 1307.886628][ T3566] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1307.892187][ T3566] ? do_splice_to+0x160/0x160 [ 1307.896884][ T3566] do_splice_direct+0x1b4/0x280 [ 1307.901747][ T3566] ? splice_direct_to_actor+0x980/0x980 [ 1307.907327][ T3566] do_sendfile+0x555/0xc50 [ 1307.911793][ T3566] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1307.917071][ T3566] ? wait_for_completion+0x270/0x270 [ 1307.922335][ T3566] ? __sb_end_write+0x101/0x1d0 [ 1307.927165][ T3566] ? vfs_write+0x161/0x5d0 [ 1307.931575][ T3566] __x64_sys_sendfile64+0x1cc/0x210 [ 1307.936770][ T3566] ? ksys_write+0x1a5/0x250 [ 1307.941265][ T3566] ? __ia32_sys_sendfile+0x220/0x220 [ 1307.946703][ T3566] ? __ia32_sys_clock_settime+0x260/0x260 [ 1307.952420][ T3566] ? trace_hardirqs_off_caller+0x55/0x230 [ 1307.958165][ T3566] do_syscall_64+0xf6/0x7d0 [ 1307.962670][ T3566] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1307.968573][ T3566] RIP: 0033:0x45c829 [ 1307.972463][ T3566] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.992058][ T3566] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1308.000481][ T3566] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1308.008434][ T3566] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1308.016387][ T3566] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 10:19:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f0000000080)={0x20, 0xfffff5ee, 0x101, 0x5, 0x2, 0xfffffffa, 0x9}) [ 1308.024344][ T3566] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1308.032300][ T3566] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:19:00 executing program 4 (fault-call:2 fault-nth:5): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:19:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000600000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1308.200825][ T3588] FAULT_INJECTION: forcing a failure. [ 1308.200825][ T3588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1308.238087][ T3588] CPU: 1 PID: 3588 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1308.246707][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.256766][ T3588] Call Trace: [ 1308.260071][ T3588] dump_stack+0x188/0x20d [ 1308.264422][ T3588] should_fail.cold+0x5/0xa [ 1308.268949][ T3588] ? fault_create_debugfs_attr+0x140/0x140 [ 1308.274777][ T3588] __alloc_pages_nodemask+0x17a/0x810 [ 1308.280257][ T3588] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1308.287031][ T3588] ? __kmalloc_node+0x38/0x60 [ 1308.291811][ T3588] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1308.297636][ T3588] alloc_pages_current+0xff/0x200 [ 1308.302675][ T3588] push_pipe+0x2af/0x690 [ 1308.306938][ T3588] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1308.312683][ T3588] ? iov_iter_for_each_range+0x750/0x750 [ 1308.318327][ T3588] ? stack_trace_consume_entry+0x160/0x160 [ 1308.324157][ T3588] default_file_splice_read+0x1d5/0xa20 [ 1308.329720][ T3588] ? save_stack+0x32/0x40 [ 1308.334043][ T3588] ? save_stack+0x1b/0x40 [ 1308.338360][ T3588] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1308.344183][ T3588] ? __kmalloc+0x161/0x7a0 [ 1308.348595][ T3588] ? do_splice_direct+0x1b4/0x280 [ 1308.353613][ T3588] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1308.359027][ T3588] ? do_syscall_64+0xf6/0x7d0 [ 1308.363703][ T3588] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1308.369780][ T3588] ? iter_file_splice_write+0xb00/0xb00 [ 1308.375331][ T3588] ? mark_held_locks+0xe0/0xe0 [ 1308.380106][ T3588] ? mark_held_locks+0xe0/0xe0 [ 1308.384870][ T3588] ? lock_downgrade+0x840/0x840 [ 1308.389722][ T3588] ? mark_lock+0x12b/0xf10 [ 1308.394145][ T3588] ? mark_lock+0x12b/0xf10 [ 1308.398582][ T3588] ? find_held_lock+0x2d/0x110 [ 1308.403378][ T3588] ? fsnotify+0x7df/0xb50 [ 1308.407716][ T3588] ? fsnotify_parent+0xbf/0x2d0 [ 1308.412578][ T3588] ? fsnotify_first_mark+0x200/0x200 [ 1308.417863][ T3588] ? avc_policy_seqno+0x9/0x70 [ 1308.422611][ T3588] ? selinux_file_permission+0x92/0x560 [ 1308.428264][ T3588] ? security_file_permission+0x8c/0x470 [ 1308.433908][ T3588] ? iter_file_splice_write+0xb00/0xb00 [ 1308.439440][ T3588] do_splice_to+0x114/0x160 [ 1308.443938][ T3588] splice_direct_to_actor+0x307/0x980 [ 1308.449305][ T3588] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1308.454847][ T3588] ? do_splice_to+0x160/0x160 [ 1308.459505][ T3588] do_splice_direct+0x1b4/0x280 [ 1308.464363][ T3588] ? splice_direct_to_actor+0x980/0x980 [ 1308.469924][ T3588] do_sendfile+0x555/0xc50 [ 1308.474356][ T3588] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1308.479639][ T3588] ? wait_for_completion+0x270/0x270 [ 1308.484924][ T3588] ? __sb_end_write+0x101/0x1d0 [ 1308.490034][ T3588] ? vfs_write+0x161/0x5d0 [ 1308.494483][ T3588] __x64_sys_sendfile64+0x1cc/0x210 [ 1308.499767][ T3588] ? ksys_write+0x1a5/0x250 [ 1308.504250][ T3588] ? __ia32_sys_sendfile+0x220/0x220 [ 1308.509519][ T3588] ? __ia32_sys_clock_settime+0x260/0x260 [ 1308.515248][ T3588] ? trace_hardirqs_off_caller+0x55/0x230 [ 1308.520973][ T3588] do_syscall_64+0xf6/0x7d0 [ 1308.525464][ T3588] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1308.531357][ T3588] RIP: 0033:0x45c829 [ 1308.535241][ T3588] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1308.554826][ T3588] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1308.563222][ T3588] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1308.571194][ T3588] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1308.579159][ T3588] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1308.587130][ T3588] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1308.595093][ T3588] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:19:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:19:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="04009b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c2d7c932be2f0046a8c9c84b8b61fdf555b15e7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 10:19:02 executing program 4 (fault-call:2 fault-nth:6): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:19:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0058650000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:19:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) pipe(&(0x7f0000000000)) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1310.135323][ T3608] FAULT_INJECTION: forcing a failure. [ 1310.135323][ T3608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1310.168212][ T3608] CPU: 1 PID: 3608 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1310.176839][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.181705][ T3621] fuse: Unknown parameter '' [ 1310.186891][ T3608] Call Trace: [ 1310.186917][ T3608] dump_stack+0x188/0x20d [ 1310.186941][ T3608] should_fail.cold+0x5/0xa [ 1310.186959][ T3608] ? fault_create_debugfs_attr+0x140/0x140 [ 1310.186985][ T3608] __alloc_pages_nodemask+0x17a/0x810 [ 1310.214026][ T3624] fuse: Unknown parameter '' [ 1310.215320][ T3608] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1310.215335][ T3608] ? __kmalloc_node+0x38/0x60 [ 1310.215353][ T3608] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1310.215380][ T3608] alloc_pages_current+0xff/0x200 [ 1310.242279][ T3608] push_pipe+0x2af/0x690 [ 1310.246551][ T3608] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1310.252202][ T3608] ? iov_iter_for_each_range+0x750/0x750 [ 1310.257848][ T3608] ? stack_trace_consume_entry+0x160/0x160 [ 1310.263669][ T3608] default_file_splice_read+0x1d5/0xa20 [ 1310.269221][ T3608] ? save_stack+0x32/0x40 [ 1310.273550][ T3608] ? save_stack+0x1b/0x40 [ 1310.277885][ T3608] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1310.283701][ T3608] ? __kmalloc+0x161/0x7a0 [ 1310.288124][ T3608] ? do_splice_direct+0x1b4/0x280 [ 1310.293169][ T3608] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1310.298544][ T3608] ? do_syscall_64+0xf6/0x7d0 [ 1310.303226][ T3608] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1310.309297][ T3608] ? iter_file_splice_write+0xb00/0xb00 [ 1310.314930][ T3608] ? mark_held_locks+0xe0/0xe0 [ 1310.319703][ T3608] ? mark_held_locks+0xe0/0xe0 [ 1310.324471][ T3608] ? lock_downgrade+0x840/0x840 [ 1310.329331][ T3608] ? mark_lock+0x12b/0xf10 10:19:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x29) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) symlink(&(0x7f00000006c0)='./file0\x00', &(0x7f00000008c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/67, 0x43}, {&(0x7f0000000180)=""/224, 0xe0}], 0x2, &(0x7f0000000440)=""/185, 0xb9}, 0x2}, {{&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000280)=""/21, 0x15}, {&(0x7f0000000500)=""/32, 0x20}, {&(0x7f0000000540)=""/6, 0x6}, {&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/192, 0xc0}, {&(0x7f00000006c0)}], 0x6, &(0x7f0000000780)=""/130, 0x82}, 0x3}], 0x2, 0x21, 0x0) r2 = open(&(0x7f0000000900)='./file0\x00', 0x100, 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x4c, 0x1402, 0x20, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000}, 0x44000) [ 1310.333761][ T3608] ? mark_lock+0x12b/0xf10 [ 1310.338189][ T3608] ? find_held_lock+0x2d/0x110 [ 1310.342958][ T3608] ? fsnotify+0x7df/0xb50 [ 1310.347291][ T3608] ? fsnotify_parent+0xbf/0x2d0 [ 1310.352157][ T3608] ? fsnotify_first_mark+0x200/0x200 [ 1310.357485][ T3608] ? avc_policy_seqno+0x9/0x70 [ 1310.362251][ T3608] ? selinux_file_permission+0x92/0x560 [ 1310.367803][ T3608] ? security_file_permission+0x8c/0x470 [ 1310.373447][ T3608] ? iter_file_splice_write+0xb00/0xb00 [ 1310.379008][ T3608] do_splice_to+0x114/0x160 [ 1310.383522][ T3608] splice_direct_to_actor+0x307/0x980 [ 1310.388905][ T3608] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1310.394461][ T3608] ? do_splice_to+0x160/0x160 [ 1310.399157][ T3608] do_splice_direct+0x1b4/0x280 [ 1310.404033][ T3608] ? splice_direct_to_actor+0x980/0x980 [ 1310.409601][ T3608] do_sendfile+0x555/0xc50 [ 1310.414040][ T3608] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1310.419332][ T3608] ? wait_for_completion+0x270/0x270 [ 1310.424627][ T3608] ? __sb_end_write+0x101/0x1d0 [ 1310.429483][ T3608] ? vfs_write+0x161/0x5d0 [ 1310.433911][ T3608] __x64_sys_sendfile64+0x1cc/0x210 [ 1310.439114][ T3608] ? ksys_write+0x1a5/0x250 [ 1310.443621][ T3608] ? __ia32_sys_sendfile+0x220/0x220 [ 1310.448908][ T3608] ? __ia32_sys_clock_settime+0x260/0x260 [ 1310.454776][ T3608] ? trace_hardirqs_off_caller+0x55/0x230 [ 1310.460500][ T3608] do_syscall_64+0xf6/0x7d0 [ 1310.464990][ T3608] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1310.470908][ T3608] RIP: 0033:0x45c829 [ 1310.474809][ T3608] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.497535][ T3608] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1310.506103][ T3608] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1310.514079][ T3608] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1310.522072][ T3608] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1310.530340][ T3608] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1310.538315][ T3608] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:19:02 executing program 4 (fault-call:2 fault-nth:7): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:19:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0008730000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1310.630351][ T3645] FAULT_INJECTION: forcing a failure. [ 1310.630351][ T3645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1310.652946][ T56] tipc: TX() has been purged, node left! [ 1310.658982][ T3645] CPU: 0 PID: 3645 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1310.667612][ T3645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.677672][ T3645] Call Trace: [ 1310.680980][ T3645] dump_stack+0x188/0x20d [ 1310.685332][ T3645] should_fail.cold+0x5/0xa [ 1310.689863][ T3645] ? fault_create_debugfs_attr+0x140/0x140 [ 1310.695688][ T3645] __alloc_pages_nodemask+0x17a/0x810 [ 1310.701055][ T3645] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1310.707820][ T3645] ? __kmalloc_node+0x38/0x60 [ 1310.712514][ T3645] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1310.718325][ T3645] alloc_pages_current+0xff/0x200 [ 1310.723365][ T3645] push_pipe+0x2af/0x690 [ 1310.727632][ T3645] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1310.733282][ T3645] ? iov_iter_for_each_range+0x750/0x750 [ 1310.738928][ T3645] ? stack_trace_consume_entry+0x160/0x160 [ 1310.744742][ T3645] default_file_splice_read+0x1d5/0xa20 [ 1310.750317][ T3645] ? save_stack+0x32/0x40 [ 1310.754666][ T3645] ? save_stack+0x1b/0x40 [ 1310.758995][ T3645] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1310.764889][ T3645] ? __kmalloc+0x161/0x7a0 [ 1310.769349][ T3645] ? do_splice_direct+0x1b4/0x280 [ 1310.774459][ T3645] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1310.779872][ T3645] ? do_syscall_64+0xf6/0x7d0 [ 1310.784598][ T3645] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1310.791454][ T3645] ? iter_file_splice_write+0xb00/0xb00 [ 1310.797044][ T3645] ? mark_held_locks+0xe0/0xe0 [ 1310.801811][ T3645] ? mark_held_locks+0xe0/0xe0 [ 1310.806591][ T3645] ? lock_downgrade+0x840/0x840 [ 1310.811455][ T3645] ? mark_lock+0x12b/0xf10 [ 1310.815878][ T3645] ? mark_lock+0x12b/0xf10 [ 1310.820305][ T3645] ? find_held_lock+0x2d/0x110 [ 1310.825054][ T3645] ? fsnotify+0x7df/0xb50 [ 1310.829377][ T3645] ? fsnotify_parent+0xbf/0x2d0 [ 1310.834244][ T3645] ? fsnotify_first_mark+0x200/0x200 [ 1310.839560][ T3645] ? avc_policy_seqno+0x9/0x70 [ 1310.844309][ T3645] ? selinux_file_permission+0x92/0x560 [ 1310.849869][ T3645] ? security_file_permission+0x8c/0x470 [ 1310.855526][ T3645] ? iter_file_splice_write+0xb00/0xb00 [ 1310.861086][ T3645] do_splice_to+0x114/0x160 [ 1310.865675][ T3645] splice_direct_to_actor+0x307/0x980 [ 1310.871053][ T3645] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1310.876616][ T3645] ? do_splice_to+0x160/0x160 [ 1310.881320][ T3645] do_splice_direct+0x1b4/0x280 [ 1310.887908][ T3645] ? splice_direct_to_actor+0x980/0x980 [ 1310.893490][ T3645] do_sendfile+0x555/0xc50 [ 1310.897930][ T3645] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1310.903282][ T3645] ? wait_for_completion+0x270/0x270 [ 1310.908568][ T3645] ? __sb_end_write+0x101/0x1d0 [ 1310.913425][ T3645] ? vfs_write+0x161/0x5d0 [ 1310.917857][ T3645] __x64_sys_sendfile64+0x1cc/0x210 [ 1310.923092][ T3645] ? ksys_write+0x1a5/0x250 [ 1310.927599][ T3645] ? __ia32_sys_sendfile+0x220/0x220 [ 1310.932875][ T3645] ? __ia32_sys_clock_settime+0x260/0x260 [ 1310.938594][ T3645] ? trace_hardirqs_off_caller+0x55/0x230 [ 1310.944309][ T3645] do_syscall_64+0xf6/0x7d0 [ 1310.948816][ T3645] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1310.954724][ T3645] RIP: 0033:0x45c829 [ 1310.958616][ T3645] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:19:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1310.978228][ T3645] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1310.986649][ T3645] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1310.994629][ T3645] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1311.002635][ T3645] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1311.010620][ T3645] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1311.018603][ T3645] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:19:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000810000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:19:03 executing program 4 (fault-call:2 fault-nth:8): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:19:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x4a800) socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3800000024000b0f00"/20, @ANYBLOB], 0x2}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 1311.276724][ T3666] FAULT_INJECTION: forcing a failure. [ 1311.276724][ T3666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1311.328296][ T3666] CPU: 1 PID: 3666 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1311.336927][ T3666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.346989][ T3666] Call Trace: [ 1311.350293][ T3666] dump_stack+0x188/0x20d [ 1311.354640][ T3666] should_fail.cold+0x5/0xa [ 1311.359158][ T3666] ? fault_create_debugfs_attr+0x140/0x140 [ 1311.365011][ T3666] __alloc_pages_nodemask+0x17a/0x810 [ 1311.370399][ T3666] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1311.378553][ T3666] ? __kmalloc_node+0x38/0x60 [ 1311.383248][ T3666] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1311.389065][ T3666] alloc_pages_current+0xff/0x200 [ 1311.394103][ T3666] push_pipe+0x2af/0x690 [ 1311.398371][ T3666] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1311.404020][ T3666] ? iov_iter_for_each_range+0x750/0x750 [ 1311.409648][ T3666] ? stack_trace_consume_entry+0x160/0x160 [ 1311.415457][ T3666] default_file_splice_read+0x1d5/0xa20 [ 1311.421006][ T3666] ? save_stack+0x32/0x40 [ 1311.425333][ T3666] ? save_stack+0x1b/0x40 [ 1311.429651][ T3666] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1311.435453][ T3666] ? __kmalloc+0x161/0x7a0 [ 1311.439870][ T3666] ? do_splice_direct+0x1b4/0x280 [ 1311.444882][ T3666] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1311.450241][ T3666] ? do_syscall_64+0xf6/0x7d0 [ 1311.454907][ T3666] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1311.460962][ T3666] ? iter_file_splice_write+0xb00/0xb00 [ 1311.466497][ T3666] ? mark_held_locks+0xe0/0xe0 [ 1311.471245][ T3666] ? mark_held_locks+0xe0/0xe0 [ 1311.476005][ T3666] ? lock_downgrade+0x840/0x840 [ 1311.480855][ T3666] ? mark_lock+0x12b/0xf10 [ 1311.485262][ T3666] ? mark_lock+0x12b/0xf10 [ 1311.489674][ T3666] ? find_held_lock+0x2d/0x110 [ 1311.494425][ T3666] ? fsnotify+0x7df/0xb50 [ 1311.498740][ T3666] ? fsnotify_parent+0xbf/0x2d0 [ 1311.503596][ T3666] ? fsnotify_first_mark+0x200/0x200 [ 1311.508877][ T3666] ? avc_policy_seqno+0x9/0x70 [ 1311.513630][ T3666] ? selinux_file_permission+0x92/0x560 [ 1311.519173][ T3666] ? security_file_permission+0x8c/0x470 [ 1311.524804][ T3666] ? iter_file_splice_write+0xb00/0xb00 [ 1311.530346][ T3666] do_splice_to+0x114/0x160 [ 1311.534906][ T3666] splice_direct_to_actor+0x307/0x980 [ 1311.540274][ T3666] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1311.545819][ T3666] ? do_splice_to+0x160/0x160 [ 1311.550506][ T3666] do_splice_direct+0x1b4/0x280 [ 1311.555352][ T3666] ? splice_direct_to_actor+0x980/0x980 [ 1311.560909][ T3666] do_sendfile+0x555/0xc50 [ 1311.565326][ T3666] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1311.570609][ T3666] ? wait_for_completion+0x270/0x270 [ 1311.575903][ T3666] ? __sb_end_write+0x101/0x1d0 [ 1311.580746][ T3666] ? vfs_write+0x161/0x5d0 [ 1311.585172][ T3666] __x64_sys_sendfile64+0x1cc/0x210 [ 1311.590364][ T3666] ? ksys_write+0x1a5/0x250 [ 1311.594857][ T3666] ? __ia32_sys_sendfile+0x220/0x220 [ 1311.600149][ T3666] ? __ia32_sys_clock_settime+0x260/0x260 [ 1311.605860][ T3666] ? trace_hardirqs_off_caller+0x55/0x230 [ 1311.611578][ T3666] do_syscall_64+0xf6/0x7d0 [ 1311.616088][ T3666] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1311.621966][ T3666] RIP: 0033:0x45c829 [ 1311.625859][ T3666] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.645451][ T3666] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1311.653853][ T3666] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1311.661809][ T3666] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1311.669766][ T3666] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1311.677722][ T3666] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1311.685680][ T3666] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:19:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a5, &(0x7f0000000480)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:19:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000f00000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:19:05 executing program 4 (fault-call:2 fault-nth:9): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:19:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x2000000000010, 0x80000000002, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f00034009300edfc0e800300000000af00000000000800010048050006", 0x24) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x40000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fu=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 10:19:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1ab, &(0x7f0000000480)="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"}}], 0x1c) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0xffff) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:19:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000400300", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) [ 1313.244912][ T3723] FAULT_INJECTION: forcing a failure. [ 1313.244912][ T3723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1313.283778][ T3726] fuse: Unknown parameter 'fu' [ 1313.328314][ T3735] fuse: Unknown parameter 'fu' [ 1313.333852][ T3723] CPU: 1 PID: 3723 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1313.342713][ T3723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.352854][ T3723] Call Trace: [ 1313.356135][ T3723] dump_stack+0x188/0x20d [ 1313.360459][ T3723] should_fail.cold+0x5/0xa [ 1313.364952][ T3723] ? fault_create_debugfs_attr+0x140/0x140 [ 1313.370763][ T3723] __alloc_pages_nodemask+0x17a/0x810 [ 1313.376134][ T3723] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1313.382885][ T3723] ? __kmalloc_node+0x38/0x60 [ 1313.387570][ T3723] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1313.393360][ T3723] alloc_pages_current+0xff/0x200 [ 1313.398743][ T3723] push_pipe+0x2af/0x690 [ 1313.402974][ T3723] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1313.408611][ T3723] ? iov_iter_for_each_range+0x750/0x750 [ 1313.414245][ T3723] ? stack_trace_consume_entry+0x160/0x160 [ 1313.420055][ T3723] default_file_splice_read+0x1d5/0xa20 [ 1313.425593][ T3723] ? save_stack+0x32/0x40 [ 1313.429924][ T3723] ? save_stack+0x1b/0x40 [ 1313.434230][ T3723] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1313.440369][ T3723] ? __kmalloc+0x161/0x7a0 [ 1313.444792][ T3723] ? do_splice_direct+0x1b4/0x280 [ 1313.449827][ T3723] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1313.455194][ T3723] ? do_syscall_64+0xf6/0x7d0 [ 1313.459861][ T3723] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1313.465935][ T3723] ? iter_file_splice_write+0xb00/0xb00 [ 1313.471482][ T3723] ? mark_held_locks+0xe0/0xe0 [ 1313.476249][ T3723] ? mark_held_locks+0xe0/0xe0 [ 1313.481008][ T3723] ? lock_downgrade+0x840/0x840 [ 1313.485853][ T3723] ? mark_lock+0x12b/0xf10 [ 1313.490272][ T3723] ? mark_lock+0x12b/0xf10 [ 1313.494700][ T3723] ? find_held_lock+0x2d/0x110 [ 1313.499456][ T3723] ? fsnotify+0x7df/0xb50 [ 1313.503780][ T3723] ? fsnotify_parent+0xbf/0x2d0 [ 1313.508630][ T3723] ? fsnotify_first_mark+0x200/0x200 [ 1313.513912][ T3723] ? avc_policy_seqno+0x9/0x70 [ 1313.518680][ T3723] ? selinux_file_permission+0x92/0x560 [ 1313.524209][ T3723] ? security_file_permission+0x8c/0x470 [ 1313.529841][ T3723] ? iter_file_splice_write+0xb00/0xb00 [ 1313.535379][ T3723] do_splice_to+0x114/0x160 [ 1313.539863][ T3723] splice_direct_to_actor+0x307/0x980 [ 1313.545224][ T3723] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1313.550755][ T3723] ? do_splice_to+0x160/0x160 [ 1313.555413][ T3723] do_splice_direct+0x1b4/0x280 [ 1313.560951][ T3723] ? splice_direct_to_actor+0x980/0x980 [ 1313.566491][ T3723] do_sendfile+0x555/0xc50 [ 1313.570892][ T3723] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1313.576173][ T3723] ? wait_for_completion+0x270/0x270 [ 1313.581456][ T3723] ? __sb_end_write+0x101/0x1d0 [ 1313.587530][ T3723] ? vfs_write+0x161/0x5d0 [ 1313.591927][ T3723] __x64_sys_sendfile64+0x1cc/0x210 [ 1313.597102][ T3723] ? ksys_write+0x1a5/0x250 [ 1313.601584][ T3723] ? __ia32_sys_sendfile+0x220/0x220 [ 1313.606860][ T3723] ? __ia32_sys_clock_settime+0x260/0x260 [ 1313.612576][ T3723] ? trace_hardirqs_off_caller+0x55/0x230 [ 1313.618290][ T3723] do_syscall_64+0xf6/0x7d0 [ 1313.622790][ T3723] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1313.628670][ T3723] RIP: 0033:0x45c829 [ 1313.632575][ T3723] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.652279][ T3723] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1313.660682][ T3723] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1313.668641][ T3723] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1313.676608][ T3723] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1313.684562][ T3723] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1313.692522][ T3723] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 10:19:05 executing program 4 (fault-call:2 fault-nth:10): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 10:19:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000080)={0x2, 0xfffffffe, 0x6, 0x401, 0x0, 0x2f, 0x7f}) [ 1313.849689][ T3741] FAULT_INJECTION: forcing a failure. [ 1313.849689][ T3741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1313.872908][ T3741] CPU: 0 PID: 3741 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1313.881541][ T3741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.891598][ T3741] Call Trace: [ 1313.894897][ T3741] dump_stack+0x188/0x20d [ 1313.899251][ T3741] should_fail.cold+0x5/0xa [ 1313.903776][ T3741] ? fault_create_debugfs_attr+0x140/0x140 [ 1313.909604][ T3741] __alloc_pages_nodemask+0x17a/0x810 [ 1313.914987][ T3741] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 1313.921755][ T3741] ? __kmalloc_node+0x38/0x60 [ 1313.926446][ T3741] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1313.932268][ T3741] alloc_pages_current+0xff/0x200 [ 1313.937314][ T3741] push_pipe+0x2af/0x690 [ 1313.941586][ T3741] iov_iter_get_pages_alloc+0x8cc/0x1420 [ 1313.947230][ T3741] ? iov_iter_for_each_range+0x750/0x750 [ 1313.952878][ T3741] ? stack_trace_consume_entry+0x160/0x160 [ 1313.958791][ T3741] default_file_splice_read+0x1d5/0xa20 [ 1313.964352][ T3741] ? save_stack+0x32/0x40 [ 1313.968692][ T3741] ? save_stack+0x1b/0x40 [ 1313.973028][ T3741] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1313.978848][ T3741] ? __kmalloc+0x161/0x7a0 [ 1313.983272][ T3741] ? do_splice_direct+0x1b4/0x280 [ 1313.988310][ T3741] ? __x64_sys_sendfile64+0x1cc/0x210 [ 1313.993691][ T3741] ? do_syscall_64+0xf6/0x7d0 [ 1313.998376][ T3741] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1314.004458][ T3741] ? iter_file_splice_write+0xb00/0xb00 [ 1314.010036][ T3741] ? mark_held_locks+0xe0/0xe0 [ 1314.014815][ T3741] ? mark_held_locks+0xe0/0xe0 [ 1314.019582][ T3741] ? lock_downgrade+0x840/0x840 [ 1314.024445][ T3741] ? mark_lock+0x12b/0xf10 [ 1314.028869][ T3741] ? mark_lock+0x12b/0xf10 [ 1314.033304][ T3741] ? find_held_lock+0x2d/0x110 [ 1314.038073][ T3741] ? fsnotify+0x7df/0xb50 [ 1314.042401][ T3741] ? fsnotify_parent+0xbf/0x2d0 [ 1314.047261][ T3741] ? fsnotify_first_mark+0x200/0x200 [ 1314.052556][ T3741] ? avc_policy_seqno+0x9/0x70 [ 1314.057326][ T3741] ? selinux_file_permission+0x92/0x560 [ 1314.062884][ T3741] ? security_file_permission+0x8c/0x470 [ 1314.068531][ T3741] ? iter_file_splice_write+0xb00/0xb00 [ 1314.074147][ T3741] do_splice_to+0x114/0x160 [ 1314.078652][ T3741] splice_direct_to_actor+0x307/0x980 [ 1314.084021][ T3741] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1314.089597][ T3741] ? do_splice_to+0x160/0x160 [ 1314.094332][ T3741] do_splice_direct+0x1b4/0x280 [ 1314.099183][ T3741] ? splice_direct_to_actor+0x980/0x980 [ 1314.104914][ T3741] do_sendfile+0x555/0xc50 [ 1314.109341][ T3741] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1314.114742][ T3741] ? wait_for_completion+0x270/0x270 [ 1314.120020][ T3741] ? __sb_end_write+0x101/0x1d0 [ 1314.124872][ T3741] ? vfs_write+0x161/0x5d0 [ 1314.129282][ T3741] __x64_sys_sendfile64+0x1cc/0x210 [ 1314.134462][ T3741] ? ksys_write+0x1a5/0x250 [ 1314.138962][ T3741] ? __ia32_sys_sendfile+0x220/0x220 [ 1314.144252][ T3741] ? __ia32_sys_clock_settime+0x260/0x260 [ 1314.149963][ T3741] ? trace_hardirqs_off_caller+0x55/0x230 [ 1314.155696][ T3741] do_syscall_64+0xf6/0x7d0 [ 1314.160211][ T3741] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1314.166090][ T3741] RIP: 0033:0x45c829 [ 1314.169994][ T3741] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.189937][ T3741] RSP: 002b:00007f0c95b98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1314.198355][ T3741] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 1314.206327][ T3741] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1314.214287][ T3741] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1314.222238][ T3741] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000005 [ 1314.230204][ T3741] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007f0c95b996d4 [ 1314.248643][ T1136] INFO: task syz-executor.5:578 blocked for more than 143 seconds. 10:19:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:19:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000024000bb4fa72db2a8e4a6c0000034000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200000000c000000000"], 0x40}}, 0x0) 10:19:06 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1680, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)={{r1, r2/1000+10000}, {0x0, 0x2710}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 1314.276321][ T1136] Not tainted 5.7.0-rc3-syzkaller #0 [ 1314.276401][ T1136] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.276408][ T1136] syz-executor.5 D28400 578 576 0x00000000 [ 1314.276431][ T1136] Call Trace: [ 1314.276457][ T1136] ? __schedule+0x937/0x1ff0 [ 1314.276472][ T1136] ? rwsem_down_write_slowpath+0x90a/0xf90 [ 1314.276498][ T1136] ? __sched_text_start+0x8/0x8 [ 1314.276523][ T1136] schedule+0xd0/0x2a0 [ 1314.276538][ T1136] rwsem_down_write_slowpath+0x706/0xf90 [ 1314.276564][ T1136] ? rwsem_mark_wake+0x8d0/0x8d0 [ 1314.276581][ T1136] ? lock_acquire+0x1f2/0x8f0 [ 1314.276594][ T1136] ? path_openat+0x927/0x27d0 [ 1314.276612][ T1136] ? lock_release+0x800/0x800 [ 1314.276638][ T1136] ? down_write+0x137/0x150 [ 1314.276649][ T1136] ? down_write+0xb2/0x150 [ 1314.276659][ T1136] down_write+0x137/0x150 [ 1314.276679][ T1136] ? __down_timeout+0x2d0/0x2d0 [ 1314.276693][ T1136] ? preempt_count_add+0x74/0x140 [ 1314.276709][ T1136] ? __mnt_want_write+0x1da/0x2c0 [ 1314.276729][ T1136] path_openat+0x927/0x27d0 [ 1314.276753][ T1136] ? path_lookupat.isra.0+0x530/0x530 [ 1314.276767][ T1136] ? mark_held_locks+0xe0/0xe0 [ 1314.276781][ T1136] ? lock_acquire+0x1f2/0x8f0 [ 1314.276798][ T1136] do_filp_open+0x192/0x260 [ 1314.276811][ T1136] ? may_open_dev+0xf0/0xf0 [ 1314.276833][ T1136] ? do_raw_spin_lock+0x129/0x2e0 [ 1314.276859][ T1136] ? _raw_spin_unlock+0x24/0x40 [ 1314.276872][ T1136] ? __alloc_fd+0x46d/0x600 [ 1314.276895][ T1136] do_sys_openat2+0x585/0x7d0 [ 1314.276912][ T1136] ? file_open_root+0x400/0x400 [ 1314.276926][ T1136] ? _copy_to_user+0x126/0x160 [ 1314.276943][ T1136] ? put_timespec64+0xcb/0x120 [ 1314.276958][ T1136] ? ns_to_kernel_old_timeval+0x100/0x100 [ 1314.276976][ T1136] do_sys_open+0xc3/0x140 [ 1314.276990][ T1136] ? filp_open+0x70/0x70 [ 1314.277006][ T1136] ? __ia32_sys_clock_settime+0x260/0x260 [ 1314.277021][ T1136] ? trace_hardirqs_off_caller+0x55/0x230 [ 1314.277044][ T1136] do_syscall_64+0xf6/0x7d0 [ 1314.277062][ T1136] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1314.277073][ T1136] RIP: 0033:0x45c829 [ 1314.277087][ T1136] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.277094][ T1136] RSP: 002b:00007fb27cf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1314.277107][ T1136] RAX: ffffffffffffffda RBX: 00000000004f67c0 RCX: 000000000045c829 [ 1314.277114][ T1136] RDX: 0000000000000000 RSI: 00000000000000f0 RDI: 0000000020000080 [ 1314.277122][ T1136] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1314.277130][ T1136] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1314.277138][ T1136] R13: 0000000000000774 R14: 00000000004ca268 R15: 00007fb27cf606d4 [ 1314.282897][ T1136] [ 1314.282897][ T1136] Showing all locks held in the system: [ 1314.282998][ T1136] 1 lock held by systemd/1: [ 1314.283012][ T1136] 2 locks held by kworker/u4:1/21: [ 1314.283021][ T1136] 3 locks held by kworker/u4:2/56: [ 1314.283026][ T1136] #0: ffff8880a9787138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 1314.284102][ T1136] #1: ffffc90000f37dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 1314.284134][ T1136] #2: ffffffff8a5767b0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 1314.284169][ T1136] 1 lock held by khungtaskd/1136: [ 1314.284174][ T1136] #0: ffffffff899beb00 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 1314.284246][ T1136] 1 lock held by in:imklog/6939: [ 1314.285115][ T1136] #0: ffff8880a2667630 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 1314.285501][ T1136] 3 locks held by syz-executor.5/7580: [ 1314.285565][ T1136] 2 locks held by syz-executor.2/29979: [ 1314.285570][ T1136] #0: ffff888040e3aa10 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x18ed/0x27d0 [ 1314.287859][ T1136] #1: ffff888040e3adf0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.287944][ T1136] 2 locks held by syz-executor.2/30011: [ 1314.287948][ T1136] #0: ffff888085b713d0 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x18ed/0x27d0 [ 1314.287975][ T1136] #1: ffff888085b717b0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288004][ T1136] 2 locks held by syz-executor.2/30091: [ 1314.288008][ T1136] #0: ffff888085b4e9d0 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x18ed/0x27d0 [ 1314.288035][ T1136] #1: ffff888085b4edb0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288067][ T1136] 2 locks held by syz-executor.2/30404: [ 1314.288071][ T1136] #0: ffff888085b4e390 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x18ed/0x27d0 [ 1314.288097][ T1136] #1: ffff888085b4e770 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288126][ T1136] 2 locks held by syz-executor.2/30474: [ 1314.288130][ T1136] #0: ffff888040e6fa90 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x18ed/0x27d0 [ 1314.288155][ T1136] #1: ffff888040e6fe70 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288185][ T1136] 2 locks held by syz-executor.2/30546: [ 1314.288189][ T1136] #0: ffff888043a77450 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x18ed/0x27d0 [ 1314.288216][ T1136] #1: ffff888043a77830 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288268][ T1136] 3 locks held by syz-executor.5/31880: [ 1314.288272][ T1136] #0: ffff88804601e450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.288301][ T1136] #1: ffff8880439a2250 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.288326][ T1136] #2: ffff8880439a2630 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288357][ T1136] 3 locks held by syz-executor.5/32241: [ 1314.288361][ T1136] #0: ffff88809e962450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.288390][ T1136] #1: ffff8880439ce190 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.288418][ T1136] #2: ffff8880439ce570 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288450][ T1136] 3 locks held by syz-executor.5/32399: [ 1314.288454][ T1136] #0: ffff888045df4450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.288483][ T1136] #1: ffff888040cb4a10 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.288511][ T1136] #2: ffff888040cb4df0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.288542][ T1136] 3 locks held by syz-executor.5/32738: [ 1314.288547][ T1136] #0: ffff888092116450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.288576][ T1136] #1: ffff8880439ce7d0 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.288603][ T1136] #2: ffff8880439cebb0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.292131][ T1136] 3 locks held by syz-executor.5/409: [ 1314.292136][ T1136] #0: ffff8880578ea450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.292167][ T1136] #1: ffff888040e95410 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.292194][ T1136] #2: ffff888040e957f0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.292226][ T1136] 3 locks held by syz-executor.5/576: [ 1314.292231][ T1136] #0: ffff88809db0e450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.293262][ T1136] #1: ffff888040e0d790 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.293291][ T1136] #2: ffff888040e0db70 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.293323][ T1136] 2 locks held by syz-executor.5/578: [ 1314.293328][ T1136] #0: ffff88809db0e450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.293358][ T1136] #1: ffff888040e0d790 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.294393][ T1136] 3 locks held by syz-executor.3/697: [ 1314.294398][ T1136] #0: ffff888045d60450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.294425][ T1136] #1: ffff8880439a2890 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.294452][ T1136] #2: ffff8880439a2c70 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.294483][ T1136] 3 locks held by syz-executor.5/770: [ 1314.294488][ T1136] #0: ffff8880510f6450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.294649][ T1136] #1: ffff888040e95a50 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.294684][ T1136] #2: ffff888040e95e30 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.294716][ T1136] 3 locks held by syz-executor.5/939: [ 1314.294721][ T1136] #0: ffff888044026450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.294750][ T1136] #1: ffff88804397f150 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.294778][ T1136] #2: ffff88804397f530 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.294809][ T1136] 3 locks held by syz-executor.5/1010: [ 1314.294814][ T1136] #0: ffff88804c108450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.294844][ T1136] #1: ffff888040cb43d0 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.294871][ T1136] #2: ffff888040cb47b0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.294903][ T1136] 3 locks held by syz-executor.5/1379: [ 1314.294907][ T1136] #0: ffff8880a0962450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.294938][ T1136] #1: ffff888040e6f450 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.294964][ T1136] #2: ffff888040e6f830 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.295002][ T1136] 3 locks held by syz-executor.5/1411: [ 1314.295007][ T1136] #0: ffff8880946a2450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.295036][ T1136] #1: ffff888043a47850 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.295064][ T1136] #2: ffff888043a47c30 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.295095][ T1136] 3 locks held by syz-executor.5/1435: [ 1314.295100][ T1136] #0: ffff888041fa0450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.295129][ T1136] #1: ffff888085b71a10 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.295157][ T1136] #2: ffff888085b71df0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.295188][ T1136] 3 locks held by syz-executor.5/1480: [ 1314.295193][ T1136] #0: ffff888049684450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.295223][ T1136] #1: ffff888043a47210 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.295250][ T1136] #2: ffff888043a475f0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.295281][ T1136] 3 locks held by syz-executor.5/1520: [ 1314.295286][ T1136] #0: ffff8880482fa450 (sb_writers#23){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 1314.295316][ T1136] #1: ffff888043af17d0 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x927/0x27d0 [ 1314.295343][ T1136] #2: ffff888043af1bb0 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xaf/0xe0 [ 1314.295380][ T1136] 5 locks held by syz-executor.4/3741: [ 1314.295389][ T1136] 1 lock held by systemd-udevd/3752: [ 1314.302994][ T1136] [ 1314.303001][ T1136] ============================================= [ 1314.303001][ T1136] [ 1314.303008][ T1136] NMI backtrace for cpu 0 [ 1314.303022][ T1136] CPU: 0 PID: 1136 Comm: khungtaskd Not tainted 5.7.0-rc3-syzkaller #0 [ 1314.303029][ T1136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.303034][ T1136] Call Trace: [ 1314.303052][ T1136] dump_stack+0x188/0x20d [ 1314.303070][ T1136] nmi_cpu_backtrace.cold+0x70/0xb1 [ 1314.303149][ T1136] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 1314.303164][ T1136] nmi_trigger_cpumask_backtrace+0x231/0x27e [ 1314.303178][ T1136] watchdog+0xa8c/0x1010 [ 1314.303195][ T1136] ? reset_hung_task_detector+0x30/0x30 [ 1314.303240][ T1136] kthread+0x388/0x470 [ 1314.303254][ T1136] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1314.303271][ T1136] ret_from_fork+0x24/0x30 [ 1314.303323][ T1136] Sending NMI from CPU 0 to CPUs 1: [ 1314.303970][ C1] NMI backtrace for cpu 1 [ 1314.303975][ C1] CPU: 1 PID: 4124 Comm: systemd-udevd Not tainted 5.7.0-rc3-syzkaller #0 [ 1314.303982][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.303986][ C1] RIP: 0010:write_comp_data+0x0/0x70 [ 1314.303997][ C1] Code: 20 48 8b 88 e0 13 00 00 8b 80 dc 13 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 0f 1f 84 00 00 00 00 00 <65> 4c 8b 04 25 00 1f 02 00 65 8b 05 c8 ef 8e 7e a9 00 01 1f 00 75 [ 1314.304001][ C1] RSP: 0018:ffffc900014774f8 EFLAGS: 00000202 [ 1314.304009][ C1] RAX: ffff888097afc280 RBX: 0000000000000002 RCX: ffffffff83604cc8 [ 1314.304015][ C1] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000005 [ 1314.304020][ C1] RBP: ffff888095891180 R08: ffff888097afc280 R09: fffffbfff19021f5 [ 1314.304026][ C1] R10: ffffffff8c810fa7 R11: fffffbfff19021f4 R12: 0000000000000026 [ 1314.304031][ C1] R13: 0000000000000191 R14: dffffc0000000000 R15: 0000000000000001 [ 1314.304036][ C1] FS: 00007fdc2dfef8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1314.304040][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1314.304045][ C1] CR2: 00007fdc2d122740 CR3: 00000000a40a3000 CR4: 00000000001426e0 [ 1314.304049][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1314.304054][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1314.304056][ C1] Call Trace: [ 1314.304060][ C1] tomoyo_domain_quota_is_ok+0x308/0x500 [ 1314.304063][ C1] tomoyo_supervisor+0x2d5/0xee0 [ 1314.304066][ C1] ? tomoyo_profile+0x50/0x50 [ 1314.304070][ C1] ? lock_downgrade+0x840/0x840 [ 1314.304073][ C1] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1314.304077][ C1] ? tomoyo_path_matches_pattern+0x110/0x280 [ 1314.304081][ C1] ? tomoyo_compare_name_union+0x4f/0xe0 [ 1314.304084][ C1] ? tomoyo_check_path_acl+0x8b/0x130 [ 1314.304087][ C1] ? kfree+0x1eb/0x2b0 [ 1314.304090][ C1] ? tomoyo_check_acl+0x2e5/0x3e0 [ 1314.304094][ C1] tomoyo_path_permission+0x257/0x360 [ 1314.304097][ C1] tomoyo_check_open_permission+0x336/0x370 [ 1314.304101][ C1] ? tomoyo_path_number_perm+0x4d0/0x4d0 [ 1314.304104][ C1] ? avc_has_perm_noaudit+0x520/0x520 [ 1314.304108][ C1] ? inode_has_perm+0x230/0x230 [ 1314.304111][ C1] ? lock_downgrade+0x840/0x840 [ 1314.304114][ C1] ? do_raw_spin_lock+0x129/0x2e0 [ 1314.304117][ C1] tomoyo_file_open+0xa3/0xd0 [ 1314.304120][ C1] security_file_open+0x6e/0x410 [ 1314.304124][ C1] do_dentry_open+0x358/0x1290 [ 1314.304127][ C1] ? security_inode_permission+0xc4/0xf0 [ 1314.304130][ C1] ? chown_common+0x550/0x550 [ 1314.304134][ C1] ? inode_permission+0xab/0x500 [ 1314.304137][ C1] path_openat+0x1e59/0x27d0 [ 1314.304140][ C1] ? path_lookupat.isra.0+0x530/0x530 [ 1314.304143][ C1] ? mark_held_locks+0xe0/0xe0 [ 1314.304147][ C1] ? lock_acquire+0x1f2/0x8f0 [ 1314.304149][ C1] do_filp_open+0x192/0x260 [ 1314.304153][ C1] ? may_open_dev+0xf0/0xf0 [ 1314.304156][ C1] ? do_raw_spin_lock+0x129/0x2e0 [ 1314.304159][ C1] ? _raw_spin_unlock+0x24/0x40 [ 1314.304192][ C1] ? __alloc_fd+0x46d/0x600 [ 1314.304195][ C1] do_sys_openat2+0x585/0x7d0 [ 1314.304198][ C1] ? file_open_root+0x400/0x400 [ 1314.304202][ C1] ? __secure_computing+0x104/0x360 [ 1314.304205][ C1] ? syscall_trace_enter+0x41d/0xd10 [ 1314.304208][ C1] do_sys_open+0xc3/0x140 [ 1314.304211][ C1] ? filp_open+0x70/0x70 [ 1314.304215][ C1] ? trace_hardirqs_off_caller+0x55/0x230 [ 1314.304218][ C1] do_syscall_64+0xf6/0x7d0 [ 1314.304221][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1314.304224][ C1] RIP: 0033:0x7fdc2ce626f0 [ 1314.304235][ C1] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 19 30 2c 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe 9d 01 00 48 89 04 24 [ 1314.304238][ C1] RSP: 002b:00007ffedf1be588 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1314.304246][ C1] RAX: ffffffffffffffda RBX: 000055e657480e10 RCX: 00007fdc2ce626f0 [ 1314.304251][ C1] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffedf1be730 [ 1314.304256][ C1] RBP: 0000000000000008 R08: 0000000000000008 R09: 0000000000000001 [ 1314.304260][ C1] R10: 0000000000080000 R11: 0000000000000246 R12: 000055e65624568a [ 1314.304265][ C1] R13: 0000000000000001 R14: 000055e657480bc0 R15: 00007ffedf1be7b0 [ 1314.322278][ T1136] Kernel panic - not syncing: hung_task: blocked tasks [ 1314.322301][ T1136] CPU: 0 PID: 1136 Comm: khungtaskd Not tainted 5.7.0-rc3-syzkaller #0 [ 1314.322309][ T1136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.322314][ T1136] Call Trace: [ 1314.322336][ T1136] dump_stack+0x188/0x20d [ 1314.322447][ T1136] panic+0x2e3/0x75c [ 1314.322464][ T1136] ? add_taint.cold+0x16/0x16 [ 1314.322481][ T1136] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 1314.322497][ T1136] ? preempt_schedule_thunk+0x16/0x18 [ 1314.322512][ T1136] ? watchdog+0xa8c/0x1010 [ 1314.322527][ T1136] ? nmi_trigger_cpumask_backtrace+0x214/0x27e [ 1314.322543][ T1136] watchdog+0xa9d/0x1010 [ 1314.322561][ T1136] ? reset_hung_task_detector+0x30/0x30 [ 1314.322575][ T1136] kthread+0x388/0x470 [ 1314.322588][ T1136] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1314.322605][ T1136] ret_from_fork+0x24/0x30 [ 1314.324050][ T1136] Kernel Offset: disabled [ 1315.966122][ T1136] Rebooting in 86400 seconds..