omiscuous mode 20:23:15 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r4, r7, 0x0, 0x80001d00c0d0) kcmp(0x0, r6, 0x0, r4, r5) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x9b0000, 0x2, 0x8, r5, 0x0, &(0x7f0000000040)={0x9909d2, 0x7, [], @string=&(0x7f0000000000)=0xff}}) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000100)=0x3f) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 513.002407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1296 sclass=netlink_route_socket pig=23978 comm=syz-executor.1 20:23:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 513.125234] device macvtap335 entered promiscuous mode 20:23:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010065f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000005f00ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022eed0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:15 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) kcmp(0x0, r2, 0x0, r0, r1) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x3010, 0x0, 0x0, 0x9}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r6, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r6) shutdown(r6, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r7, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r7, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r9, 0x84, 0x16, 0x0, &(0x7f0000000340)) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r4, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r8, @ANYRESHEX=r6, @ANYRESDEC=r9, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r7, @ANYRESHEX=r7, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r10]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r7) r11 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r11, r11) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 513.420216] device macvtap361 entered promiscuous mode 20:23:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010075f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000006700ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:16 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0xffffffffffffff3f) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f0000000180)={0x0, 0x0, @ioapic}) r5 = open(&(0x7f0000000080)='./bus\x00', 0x8000, 0x89) sendfile(r1, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 513.597536] device macvtap336 entered promiscuous mode [ 513.631100] device macvtap362 entered promiscuous mode 20:23:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010095f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:16 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000000f00ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022eee0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100a5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 513.832927] kauditd_printk_skb: 11 callbacks suppressed [ 513.832946] audit: type=1804 audit(1578601396.266:287): pid=24031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/598/bus" dev="sda1" ino=16541 res=1 [ 513.934424] device macvtap363 entered promiscuous mode 20:23:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001800ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100c5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 513.988770] device macvtap337 entered promiscuous mode 20:23:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022eef0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:16 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r2, r5, 0x0, 0x80001d00c0d0) kcmp(0x0, r4, 0x0, r2, r3) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0xb114, 0x0, 0x1, 0x9, 0x4, 0x7f}, r4, 0x1, r1, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r8, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r8, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r8) shutdown(r8, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r9, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r9, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r9, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x16, 0x0, &(0x7f0000000340)) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r11, 0x84, 0x16, 0x0, &(0x7f0000000340)) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r12, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r9, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r6, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r10, @ANYRESHEX=r8, @ANYRESDEC=r11, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r9, @ANYRESHEX=r9, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r12]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r9) r13 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r13, r13) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 514.218117] device macvtap364 entered promiscuous mode [ 514.432151] device macvtap338 entered promiscuous mode 20:23:17 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) socket$packet(0x11, 0x3, 0x300) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x5, 0x9, 0x8}}, 0x30) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100e5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000005f00ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef00000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 514.602761] audit: type=1804 audit(1578601397.036:288): pid=24064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/598/bus" dev="sda1" ino=16541 res=1 20:23:17 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}, {{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, {0xa, 0x4e23, 0x5, @local, 0x5}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="15d323ecceaa7d3520201686912371f9f6b585154510bcddf25390d4684fb8aaadd91d310c3a295c90304fa05e2084d4f3ba5858ccc7d359bb565b074cd49b19516911202bff52d025df84445ef1b0f24e1c5267bb1b0ed0b9c5df3e588db997fe8b5d31bf2b5c8388f06ed2389bcc672a5615dcf8b543731cfd27e89ae168461b3036a65a181480e568ff160f4596d1499b6939340daa097ba0c4e68f68b260558c1691556a5f4eabee1bc7c755184a66c99e3adfdee94c9968a69978aa2824238a148b8917208553661829552fc0c866aa9ae84c05e8c4b1a5fa465380cc617ce6221e4779bb994893399b94fec85de49091b97ea4", 0xf6}, {&(0x7f0000000400)="0c0b71186f49f3fe242f5075a17e3c25692a", 0x12}, {&(0x7f0000000580)="088123d8e6def474ee6c1cfe4abe29a110601a0d6c443fbeb726ba71fa7437dcbf76af76c868a006108f8189", 0x2c}], 0x3}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x1, 0x4, 0x3, {0xa, 0x4e23, 0x8, @loopback, 0x3}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f00000007c0)}, {&(0x7f0000001200)="32f2e4341bd31e428c0f9aa6823edd0340b138fd3af8c460b08f14d84e1308a9d2d7dc7640289367e4a040a74f33bf2ba7f0a7f99f670a25b4a8085a6dd6c98af3babf5994d67b362eee4e65a20311bf1446ace8fe3a71a79098fc3dec558fa246bb5a40dcd2372296f8bbea3649fd529498cd57bc816e0a51051dff2d8218c0d5e719eeac1d48938c1c84b6df3c948e50b627ce1932b594596bf2b34e5f4815bdb3f1882218feaf52bad3594c34fa84a972c01e8dc0f722acfeb1f0b888388a7871fab10b7e9530de64c53642db4d6d055ec198d50a7bb0e5af1c7f98cd2b144c1864cf8d12e54fe09242455d33bf2f3468cef3b1ec68e94fdb31a0b7a943bf219bcc16777f334efcdd67a93ce5b8c6cf5277b928d52c770e54e3f462d999e44f144d514ea40ae58cb0e2e5fe2e974c08c488cfc55c7bfb2300af10611413fd8334aa3ef82ac43ce5df058be35d459cc38f862684ebeb572ee432c1819f2bf95af6aff3032f711701a9ad7d225554a6b18c512b8a783b7056a3a2c465d60ee4e2fd4a2dac4998ff5fbb656cab1b9de0872b00645576bb82736b05d15048e32d07fadf4cf1a347401d708b7807b477716bec73b9efccb3e6fc58a3970af22e41d8293e229a73e3156a26b94a394bc1d31e773957969c104eaf82ce1c484ee7bf8574a7b597fa39cb26862d59a502f7206d7820e5f365f8c3445580af615b7e7d58d5782e0ebf59ad290d92585b28a3b8f7fe5a43c6ee489cee03eef72bc664cd287caebdf90b33e5467ce30cdc146bbf6d288c8c13b1b5f2aa9cedf58da6d1dda9027ebeb199664670e6c505c44cce5f11f0fe4f55151a677a328cbbf409cd778ea8c4a2faa22d7867c98ab5ff5ea26bab92f3e9ebc88f22a71681fb902bfe277e8e0392541ddf2011974bf1f82501b5d589f7ea95b66f4da86716d24275a6919a4785953bd0acea71c1d0a7d46107f774b4e3dd87634ad8d919ae78cd9657be2cc62d4f8b26ee49dfb742d9e10844c3d9a580fba4097d341b8826e7cd520c97bb3866e674de309c6b3338ae59dddd3875ad43c0e84d8e9336193a7cb8ed18b4d45e0143fef1154a7e17aecde35ce027ef19f406ef05e106abdafe4ae093b21c2af1b066c15b1f2600b33930d37833692bea1484c775bc199563fb7cd90729b8d7d1f7199ef8009684ede14a284cd5054577f630ab1a83b621a2877cae080cf0fade0776ce89641745e2dcc8a0acd09dc90561ed78271a3ccc4abdec8e9942f180f8e4428df6ad1cd289fb7f29287806eb065dc8efcf180320c0a8ad060c2285e97fc8ef1559f2542caef2fa2f87116921216e09812727dacea3835247ff5b62ee23a7e70cf87a4c818697d1cd223d084a7ef1b7c8c79745ed817ca7b0efec26c024d22d443c09ddf080f4d1036a3293c3bc9cbb5c3061a408700489f63c0be53354fa35642f8eab04c2914131305f84a14718f010b1d811a222afb9bf129db8512e3b8f79d21b4c2c65253795a267d19463484603d1a9cea8cfd0827fba37b9ded2a0ac7e0040e39fc3bca07ed1289731f8b7eb7f96bb45eb049c43a5a6ca2edbbea604ef04c7acc3b3fae2a452c003ef5522cd651625531a34da078f057af91978c35bf9ab0c60b8af569a01fa58af1a0c85f7f343e857b9c07e8926fa05210869c40f61551589eae5c66cfad56b3475e8cf1d0530c16d87b969e604fdfea012e5c369acaf9f8ea4585983b0ea6b07f5e10c93b09c1b2162028227fdcc49bb964d1045d5a8e7a9dd397375ccb2a5c2b0b70e67e3b489b24407523746a9fbcddb4951d78b081ad365d918d9ebfe347f9a16328198af0767c5b23a5fd888ee8c4ace97a417fefbb7c9e4fc90c103d5765ed229df98f70636d4534cf289a13a2209fb49bd25336e1502e17e295f5cf2ad67229288f90d9377fcda3f758e9786fcf6323cb5dc94e13a5c99d17f9f86ceb947cfc5960ad00a7387c1fedb75576feaf49fbbe428843d26075364ad80c36fa5e32efd8ad0b5c4a2c4b32b30a22bb33081122623f0f4d96d459b0aa7d6fc004b99ff996f29e40b362b7162747406c565127d5e9da76947075064810a93d49ac8a573d23b90c6eb6bd96245e71cf3dbebffda249a8a5db9eeab5d82ac5075d234c1f315ff15eeab086a85e67a81ef378e4178a624c1d609b660370182bf58131cee4953d3feb3e3e877e92b5fd9466122a341fe3e7a12fb89ee5c8408811590380a3b865f6baf44e939458cac80ae2a959a31ff6e1ca2d4f7b7c925505cbc35fedfa6b6a5ee86d77785076a75656a4125026157f7b887b9973a8e1b70a5ed1b27440e234c67b4a6835c0b5390923c3e1fe8835f3e68251d37d8acf9937edc28044e3de5beb5d253e5f6d7d6e367b77c4e7784da7c8b119964658154aa01cac2e42939fda5b9ac39c472e1deb04da02adb0a40038874f190cfea265306c6350ab4ba354ac3b4ccbc613b2a6c11100dcdb44069cfcbe79d27a31b2ffc47e275a3f6f885d218dd73b572ae29e6a8a75597db9d860376552a7795ee30f1e04fec23ad761196ac548344906fca1e067fbef82502b1b2ff829e428741d06ddc49454e5704afd5aedb95345d8c718481d4cad127861b815c0753582122acba595e2571da4da999e322a65419fe09016cf958891147317e42ae08593d519ee0557399eadb3c34e2efa6bfef7e4a74edf3f9937965f6dcb23a4b626c6f68589c159467b29df11163f8356f5bf18a259f8335b9ff32ff97fb0af224e756c7740035405965e3700a0cd4891e89963ea5f7e24188c6b81765efd93a9ae6965e43617d361b5a72abcfd60d597e641791e801c95e3620ff5376197348f1f3c3b5a0d7edd47fb3b1e23df39f81ac3fec5747609e7295a624081fa8c20db6e0fa0eb8d0bda4a7a131db37f62c5b6161a20650a466e71452362ad5ae3d159b8a94f5f1d5b2da1a879e99d5ed43c66d0a1be987b88acf25304d31284a600b9483dfbb0e1dd4f6a7fe931b9b1a964ab35bc3a609263c4896b4b353f3ce5bb92b5db551008cc0c40d75785a9b047df691f1d1277cfeba9cd5bc8d1d3a735c02a149dedbcf7c6e0989cc83a17c3b1dea8f4ba5b5f5051dc3bffd4dcef0807f9a096612bbaf75fb3f6bb7ded9b53de991c99c6d5d31e966a0817f6744c702c45c42b6c3245a159ccf5daf0bc63ab1568ee11e42a2b1d4f3ba753b42f50a0d3f3276b63dc48b7c80a6873a6e3c3934cf459cd7e99b8b843fa451cd2b35bdba7eb11b11a46eabf261693579d05e05c5626e467b52dcec691e5dcf82ab71dec06a1deb314cc85a576b9bf1c90c6b75996309d2fdc6be6202e5c0a7cec70768a1d4e0ed11264be6ce9aff731b29d3034127d3c1063109a2b7c42a8e839c1a1e1270c1c14949f398ea76286c432bc4e9a022defdbccd7f6f060b7fbd3377290d9a861b391933a1945948ffea2cc03df3e94ef237ffd54f5f505138dab1529e23d8437042b16e51704e6442349a4af767d4a226ee23651cbc1b6f54c97cff0f58f7ebf1eb07ed0c3e875d008a5dbb9c27b7a8844bc00037124d0e3049c2a5e77975fcb8fb51879b3ec6695b6d122c53580243ae8e684062630eb239a6ba3906374426f42df29e5e9cc1c4990a343d364192439d3ab14f49658d33e930ed91354ddf00fd55ddda963e6a9f3ab7412d7b48ec1ae98203c235ca24b5a1bbf01d8385e8e254fd96b366964fd7647359b105fb0823811fda686dab85412fa69724497bc64edeb4bc14eada5f5c6bcbbf5ed3104b6dd123644f9a98ffd18b7aa36e007226b5be6992b2be5421e126065bcc4c175060f4265503ba591e296d30385ee98753f5e27517bae36d3447f8376ecceeb9ba23f7cc05577778ac97faf7e7ed3ec5c38ece83a37466a97de07dca41d79a14d5ee7de3bc2e6a0af82433bc177bf60f84b94acd2a9bcfb4805798fccd642223975f8c04a0067da05b8a2859bbe11dd4d89c4d15a123f0d85f4d1df18593ee4321d6f0909b50d048026146187179053806ee8553fdd6aa5f015d90993bb4cce7a36ee11b987f8c6a32251575fa373889871f90a0bfc84db14bca3cdc2a2d56b7542e7e2ce6313febd6f428319e8e6fbf7ab93e92c448145f0dee77a976f62a0edd34955a06980153f8bc2bee77303c947b6959026f2caaf1049ac354870fe39ad63087bc305114c139e289f4ce6335eeeb304e064ca0e989f41e9c89590b612baf27b6e9a7205c9a315ed57bd388eb00297be44016f9f061efd5043e22acd7dfe8a18c8b5023e36db4fc9db0416be4359af12797165dc3c352f70e5f7d546fdf5e76f04aa379fb2006b931494f6c87fb6708a23d72f277cb049ebfc2a4b249f176ff8b707bbedf0c48b4169af195ebe62f12c1f87da78f57a603eba4d40ea1bce18a3a465435e8f76e32a6533f222e41e45c6932a333bd53d38d9227a14d8f3acc35adf8e1222b5c638470f61530659bde485c71ca44cd00af6ffe5d6fd5d0010317f3f0e20dada293f71f643aab43090eda8a72359dd66cf332746d1cf27828ae65eb5cc5a4f7cea6a556b4710a94cb7c2b2d1d6f96e864999e55e2a6d45e3d116c50296fb94c6ecb23c434aea28727798edb72fe91fabbf69d2a95d9a799366dfa9f4890b091ef337a50a7ac221efe94a60b1e3d0f77054fda03f97d8e8235968f177c9ad0b7e1ecc02747be67dbc2d441ec080486e62f68fef09f163d25411e5ed4a895ea6b2463ff95a7afe3770c7f45822ee4e1675decc57e57718ca9c1d5adf67d27e7b1877bd9c0031fca1e25752b5864e224e9694e072f74b76145c5a17061093920d419defbe74d09bf2168d6194a4f1cd1fb8ba98176f58a04738671cfd8f7c29a8dd061f68870d6740dd6ef896bf0c78c6dafff24905a190793e778eff622f1c107089108a76ea4547b00483e05ab2513564299e38281e1c8c2e8fafa57144fae82be58c1d0f4701594d8f64fff147183195a5d42cd3b2ad8b1645c0fe8e20bffe5f278228ca2c5163b14a0c7fd0f753ba1958af6cfd8b690bcf52e1c633b6f52d1b1e7d8cfd15cb27c6d65e596631d845aab00884a81521f928bea8a2a94286121188e3e7ac328013e4fbd039eeba1854b5afa683eb75387c25fae0bd0d351c84f1c598a76bfc256c144b3fc440cdbeaab047e8a393d578ea97c9c6675fbdede45f02280517ee03f5cacce44aed3fcb1ecd9b89ebe8c0052b09867628ac60efbde433fc01b678a76eba39932c8569e51f233d34d9a5d7e7730ee6129d0c025af83dbe1a678d07d48497743e2229a55af14db96233049bc338f4835f637e6cd506fbac709da97b14764a131566c22591caf312e571e3fc9401697f0ea40e1211f25ad517ca708e66de2c03fe6811d7fe16cd825ed8fa8953e3fe97a8c23c2b46d09483be1aa41e34b5b39205c3ad2d257b66a4f3dba75a6bbf08ddab60e051d6af325cfc5bcf824d9470c19c5fd2826231c18b5b9d3536bc138ac4a5d4c2f9b33757ed44a10ebda72855706b92a0ee3c9cd9ef75d83f34e448b57d3ca79dfdd93cc97c4a6d1f7a533517ebd896e7a82c50dadee132067bc06817b0ba3ec44be67d550d94e456e6f775f30dde9906ea77658cb09bd178df33437c0508fb0ef3e50d86e0c9450ba279d9da61ab98db3e50f19d2e3101a3031c30eeae8a4eb5bba2ac9f2d77e713908de9c6661804554b8c8db183b3dff649b25cdd571094d2ebce6ed1128b7c7f5b4d71705215cda076d8fce25d2e2d7c10f7a545aaf360873df87eafde0cc5b34fd10", 0x1000}, {&(0x7f0000000800)="803749d50ab0a22cbd628c09a63356337871898154160f2c1f312b8a3a94e6ddd9ca7f8937c45067", 0x28}, {&(0x7f0000000840)="d1d53ea41b02a708280b16953a415b9969a6d6d873476cc16a3dc90075a323c67b9768b47369f59a60b47bb577c62ee0a5cbb2f13c692e9764373fcd200f27241738be3c08e81d97dba3dd9cec68d74869fa553e7eaa8e8eca09c1cfb8170699f532d70d3caebde236f792b2557f7ddae3b578eabc959b8cdae95457f845d2a849d1193a0d90b56c912aff3b53348ffb708e6fdc2f9778e80ca7038191950a718cb97703c8ec46544f960c1bd857a58ada86c866083960ec7fae19c15ec214466de5c6782ff11c00b6f16bafcc4bb2540958f2983cd2d05e22f4628121101518688d59747d60", 0xe6}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f0000000940)="2b3978198e1303646e3e3a33bfe54a6de25f624108375723bc4d90ce85835eeb6aa3965ddee6e96166c255cd15c2d4738b5785695fcdb41a313a025d53bdfd98e4b746cdb86a05f6e4fc3712fd45fae1c74526ee87ea207cbaddb5189f5b30b065164e1028d7f156093e612b028680663221322a5283e17b3238f92319ff7975323467bdcc836701364d95afdfa8943c6266de2f13669154e4e28eefa9b54fe39a391b4a2579eda3ccf884a6465dc41292d3dbd1ad49942d03dd8cf54092d662aac208f3a866439e43871f55277e0de3b7665249c52530b8031c962ffc6afc6781f8e9af81f68d4db303ca20aa8fcadb", 0xf0}], 0x6, &(0x7f0000003280)=[{0x1010, 0x101, 0x1, "3fbb03f04b2e415f9e4f61a7109a8795d82dbffeaadf272202213002aa18052254c1437635e30b97e64245cb5e724c583ef54ce7b133e74cebb8d308ddf8f731d39910132fc8eff34ad8ad3b738b8b4a4c44393cd892fb5f319e57e18ed0a6e66cb3742ec740945cf1da291fd67322ae9f99696ae57e99230fe50672b168696745eafd5eb41a4c0e0b010e1a2c1ecd390f4f7e378c34d609a91a9181b9dbfebf9f0257dd45e4cec1187b95bc92f195526234eacdde1420aae72de77ff0a8b1c5370c77ef3dafcb0f5a884bfc305dae7ba5eb16378c9f7ece4bc5abe9814f854d613837a878c104473fe2842dc060e6da539990e9b57fd2dc1a444aec90ede992913a683a18ee0fbc6eb3f2916ee98590e62230f920f2a2d665dd9dcb9bdf09a9b73fd43399b2430b183e1c884196743352208e2e064383c5e6dde45423f694d6779fd05ef5aa124cbdfce0504d0565d3b5833c4d17d9302ec22ed97fdd655c435b3d7072b4f2210f62960d951cc2908b30da96d3900849ccb3149776afa4f8a50c8a040d01435c800d704bc8c77f7d2b3cb87555e31d7919c32532481d8a718a37a834357e59ec410e9fff8db9cbd843ba80c99d03336bb8e194367371aa91f1831399001cee3df79b3e3726e01baa38469d3f982267014ff0d6bb84f55377adf41a1d4b9e496b01354dfcf97e302f2de29d9a9d86a7d46bd994c766bcaf099c2a3733c904ffa54cc9bd10427136344656a4cd3b16ea9b59509bb7d01d6329176648ccf302139b091a042025ebf00787b69af73a85e378693bd041381e7193df30baa28717b5c479523390e71f43a024a15294407cc60644bfe78634a7011ea48fb874877b5938cf7d23d6e91964fa34701b3b1b52db1523319398b7ae21e4e44d7350cbb69b9f2f0ef9e0f5e9fcfc379b5972b540e88f4739e17828c1bfb051c44dcca41dd211c4f27061a6d4a8d4becf70e40dc87ab91ddf66818d5e5fb145f72eaf90de988f5d930bb30ce69358308bed7d7f7fb5124cdda2b0e98e4983ef2244fbf3b36e760c50fef0e7a2c28d86fc7252aa7f7552141cc6ceb5d47cf0ce30397bdf825468ece76e50595852026cd0140412de24a98d79b13d01ea23fc6b53ce930aebe1f9f6e29c97e72dccdecf037d80589280e1e6cec5eda175703e68c0ed4270fc8a2ab74bbffe0298044be778c1a35807e991debd9c2021d409d5325e098dad2f8c8274f8b278f41d2c9104c6c0b294791e2f9dac1bef72c8220eb174444ed5cd96e72d624d1bda4d22553705dba1570e3a60850df24e03ec7dd373d76bb8675f52354d441931c62e269366d5009ae47d4e00d3f3cbef3e0c30eb30fb40e398ffea891bb3ecfc9d50eeeae21f8d024099276443722b8163b1df3964bb8ffa7ec2db3620bd286a78690c74c0a89799df112d873a3283470e72144dc52e31a8d0046bb661b41b548880adbfaa4ffad77f13ed0d4a811de2c203e943867f6a1520001b1c45cbb1d71d1c955b43099267b572ed30eacc9d208c3ba579d3e921c91fa1fd821634cabe6bd2a49e20055a8bc817d0f5034b1326bab2a2a0751eac8ba757ac355b9ccedf9157094f2cd62b45a397cae5d210af8296584744f84d93b3b5a8152749a2cd41da63cfaac44c6b7fd4b946ff22fea4863a4be00185f1a862b90cd3b3b3b99eda6d468ca274c66bac342e6697f534cb4dd8c74dcb231e4988163db61e7ef6cab509a307645b4c375b3574150ebaaf4ca4aabf34d337567059b9dc3857733c52216a60ad16d4be2e453b675123700136512c381a5d390d743cb7b222f17aab93291bb646d21d35133e714abd8996c736a9b3e732f2b6d9ff8bb517a24ba155352ac8565c1acf73fde995d61368f9e77c9b6667a0857d8705851a24e9fa81e8bd85c24fc82b76463bcb4994f4129edd028093e7c273ce5a803a0d1d80bddc729c6c7f0db40e718a22be69cc0139af0cd9cfcab55474a3fa6a36318491c1c86ea796b06237164875cdeb453589fbf60f8f6fb64aa2376ab28edb7b5fe3fd4be2fca71f3f97c77947950069a29eb17150d9bfaf771cbf007e5318dbc1b0db8fa7adc06b05595192e3d1de01346d54ca9ae63d7e2bb1b9d9a09a0c29cc5b427008cb26f1cc146bd813f8c768f33dbe65668b550de83421ed407696a58e9d9f688932fd8052cc803239a858b906b2f5e5459bd2364ba176ce5d18ac3d5bd4d93c82c3d4f9a1d2141244dc3f24dd7ce5bdcdd798dba88fc1d65e6e7cac710d33252252f40472db602d1521e49747ab232c0430cbf7d69d8e5aa7ef0ccfb54b55c7ba328a0140a76dc3c831004dfb2bcb3efa555e7069513b8edca043bf85e9470561e4f7ec5f10987d356120a91eb57b8e658f34d155db0a00693fec8d43b8a02fc0cefa415be9c33dc53e57f34c54e7495e09b759c1e00ce525d23d5716d8f94e3f306b17b8c648952cc4f6b0a6a783eb3f2a4318b24a519e25978687165cb7f698dbc0a04dd57605441f6fc56fcc7e40158e0572d2cd9a5d8076b1d43ca7f1770340f99c9a8aa8e858ecabc40b2693d434d70bc4cd1eef9f7cc1bf966f2431ecaffba4763db0fdc205b94e2052698f8888266d932d75096a829e951b5c34ef220fee41f989be647f04a3aae4fe957d345c747e2d1ecf156ea251d996b93925cec02e4b823ea9bbc36de560578c3ee11dfd64e57234335e47c254e717f046cc2174251eb4cd8320af8bc53519d2eee32e81fc4a5e8ce58e1f82bb7b44921837644beb51849a8152513b3488818156577e324161e204ceb81dbe004b747409315ae5cb88c50ed0519708e43b09594f8706280ffa206c2c69420063f57b41676ff293d6dba54fc992c76c11dcbc111252c68507910b4385402893209acea96d17613dbcad44099a46e1f381e05373ee184151c3ef70b8598b273b71c86c74e6b63a81f442111e1fb0d3705bc3f403c3efcbd2ec79cf28f68a9e5d11e21b7c95da9753af183aa8994d1d624a0789591b9a55ae64fc2a2dabaca4f69b4939819dfd076759f5d1f99e024e17fa0bdf49af1f6b6993649724b47719dc1923bc2b657b64e1d15d87444845a3230278c493d60499f80c01c6448e5a7e1e0772a627061405817600bc3aed12a4416752c3f0b6453b9417e3282229dbf94048033dccd71d11b0bd42a2897292814fbe4d479f40482caf443bf216495e2d374ba3c1f2a054e8ea1ffb5a3104aa9fa3200c1331bdf5d481c7a731815ac9fb06599e2074b14213958049ecf506c30566ea14e72391b7766af5166f2516806cb330d9f62c6d3c5872bcdaa83700efb8eb32216e14f7d1f565c40cf55c70bed66af6e2da50bbba87a7938dc7a59efbcebdcdd752e7fbd5ef265921eb0742f7ce93141e43304a929e95a70196b5d6930590a15f545f147132de731ec3efe93d7f10d6917a047b9ccf670e09a14821777dd22a3a7625bbee048b4f648bfc4eb3c742b91ed4f982f913883a068a85a80e5e22c8eb703ba43a707affa31e8c4f5bb4f61bfd0cfd1684056ae09a21d1ddec49dfa19f907badf41b75962f76d5e8b955d537d63e8e6c61bc51cdf8087536f9eaf36c6575b0d5cfd6e5347e883fc0242c5b1f659f2c682241c0d34c42b2d3ab05308fda2077cb307554f6624dbbad248106b25f88f055eb9d41f3ba244076ad8950ef3a3246b37364686ddd46d4a142f01be1ae63d583e964cb406a5cbfef382ae747b3f3eda2823f8f389fd04ce6c78eef589c80c0fe5c13acd49d2b854e24ea4f74689131498ce3618517b9f041fdcf76580ed43b154ff22621853ce2a0bcaedad4ca953ef3476ebce0dd3297d2c0d48eb545b60b005341b3a3890d254a6b1611494277f093d8a77884653336314d04f96b016d0d39aca2c96fd09cbd8f9e72af01fa47bc1c82ee99cf77bed549f6c862025dcbf6f712d5ecd31d74bf1a8bdd584dfb691492065ac952943d97cfb417f265138c7bc4db504ce5f1b97552646593aee3555571a4b759a3fb6e6b8ecdec4d33cca7f794dde1329798ecbf4e2e734053faffc839819ae17ce5d06e9fa4e5d5f3b12dd39a9c5d8463c70f4a7e40e61028f5df21cb586b2c7371ebb688eb3f84866727a52fb617c0d82594d610eb2d79033fbf117774c608c244c24106bbd71b286a94fe6ea1fea03b2d4fb9dff9e90297c723cb0d0ab5b73317e2ada17626a5bdae1b50f87bee0249a783d093a17da166072cb2e1f0799bd48e904f1c19ff2a308d73c282316e4e791a1a09ca37dea659bf60827f6b8b16e733c086fb0eaf49407cffc258ebe9fca371c0e04cc6c9f39c788386e4fb9d24515e19c273e2cd977622f5ec0da58f94cfdd19e5a52ed6dfded64e31b634564fef047e09d0065a8191bbe06bda770f97f3c4cd4c58d7ac8eedc34855ebb05277620e6dd479a303ab1692886c2af5d268da855b06678998523a696102a271819203eb07cf6eab9c0675c72148430c183e79b624be628e1bce5ea6def3d6a40a0d2326e141fb91f1e0d88b3015fd14b5bac2e78439ef8f0bc7555bb04872d3096b7e8102f0fccf15cab0fb9da6b571d5f6218fd6d1e5cb5e6d58b19cbed3380a27a11af469972290d63de7c72b0ef49c4e380014de7307697392c2bebc4e6693f366320b5b079aad37b52dfb76d27191ac9b24156042a9e98314d5bbf209c7a7c9dad50992a021557e39538384d926ae40ad5e83642e8af416daee1288c4b41e13f903144b32a92842e14be388dd59fec6208cc10da743b65c7cd877fdedc810de0fb19a16432139aeecb8b93f67c19c2594d6cd886057fb50a680a61b7284bf25fc171c2bbb7e7cfe66c7e526def2bd6784bc605934d43e4ae9cb1d93ecfa66bc39e822b28b4fdc4f9b069d73d0b7d7a1a60fe62f6f6fd245dad754699698f6329f935523ded564ff79822e4be4cf586d338dcc8130e2e03dbf8f1c68fe219e49670c465fbd2450e5d58057cb74eaf8e34c36f10455c59b9316fdf93fa0d5fd5f92fb411a994b2292de26c02d5d4c06ce21b6ecea55f09c45fed8f908808729c5c47ed1b6d7694ea7322f26b36ef8c9f1715da69c331ec2bb866605647453c183cf3eaea07d2db425a44db094ba3203972e140dde821150810242ce63f3686fe5f9e112bc1c578cf6d87b9acfe8d6c5b44fcf92e7dc0c14d627703f9e3a04e6ee84ae98416b2dee72729b6cb3c102188f0216fdc259925e5ad4b4f99c5b3442ad6c02c531608f55d005c936f70afb92598007347a8938ddc913e35b8923232e39b014e45fd3731ae9d863437e5f6900d0b8fb99bdad77279f69db85d0bc66625b583a5d3a2ccde85605e0d85f75175f18ff8ccba9edd8f2af8bb4732d707ff81b092d78ec9647a5731f4612f653568fc047173531aaa51377ed8f6f330067b8845023a6e8ba6aba4c409b7eaf7a567d4a549a4fb68236d6a659cfeef9ec781f6b0b65c73dbec3f400a34e91145911a1fa83e41d22a8e6a147e76309fffa4e266aca397015782f4805aefdb8a0d585150b0a0f41556606dba0cc936ea49690a09f8958613208328b4d2aaaf418c4e945944c0813c6cb6044c86084243168df1612921761306c82d43fa6b83cd7f559fa63392d0f6d7516ebd1a87cc724c01bdaa20b1b1d779bc3e6ca82cd23c24bc048c30f7d9d44b6cec3c0697e7eb6021e8efde8d526543b29758d664f0163c37acee618b994910f6b17d1212374c45adbd39900213e57f8ca288eb5292843e547219e2bef5de75b698d804b74b0a98f49892f539d3b14060ea5"}, {0x28, 0x104, 0x8, "1ca5d7cb9ba879dc5c047dd0199fe5579bfa"}, {0xf8, 0x118, 0x1, "e45c6ca1fc6a1c0359570bfe9c8d32e9567134f5c5feb76eca797f6ea890674b011c4720b724c505147546dda8053828fe4ad989dbc519beb4ad0ed0f347dc9c5f8112fd2ff49550caee11b42f0f686b856c14d2fba991f47f85e8161119df646b774426a0f5e341bc03d681751b3040643ff4444cea2cc5010dc44d434baffa85cf29719d02fa84b09a0e3ac16b5ec632aecd72a8be0872a541365cd63240b81bad9113e59780e799844a4260eb5c9806273ae8deebf421653b1d9b581a7fc0ed3454a0349cc88fd6943b7110b34c661480d1b20f4f305a755265e48ff20f128f1a412a"}, {0x100, 0x3a, 0x0, "97ba65b42d267057d1a4b4f2ae5ab4bc79952f319f712344e8e5ce82a76199de0be1dc00659a19e80063a9cd76511192e1887816b84b2bf6a95d8142660edddb90cf04866d6bc6a0df2fbf61b5e15c57808fa6499f74d992484f955a06ddbeec3355bccb8c77c46db25845cb91604644697a0d80f0f9f01d517795c76c4b2010142d8ad6427e97b56d1389c1b2d43a16f0b55670490386a15132a0a2da57bbe8e2409b255981d3cf0a2c0ffec4b92eda30470cc6fbd6856f8a68b66ea2ba81089a1fcf2d40a875160302bbd92a027f37e0b5936a6068f84c600b0c36e49a637cdb9a9a8f406fbdac388c76a016"}, {0x28, 0x3d, 0x7, "5e69e3b012894ccce7ba01673cbc8513d1ce7917"}, {0xe8, 0x118, 0xc5d, "89ddc452037a2b55f7014369f12918eb01bb222b11a86a55863ffcb7020e3c82e931dee9a4f0998a109d6b7bd7393e12e6da27992f8ca03a6ee66d1b6b4181b77821d018b1286d89e1e1700caf51ca2ded782dc0eb4276b5f8a78c1cf1153514dc885c154ad2f6f9a35cba8289cf9f5ad9733eef002ff924c99f5f05dfae73cd9f978542c1ad2389766820d51a20b2f4c99746b6b42099f77f16630aee9f84b3d4616c06971354e09d5957bf06925b9f1eb07845f587aead5325116218d18327e61277616ac301dd71b830e82684dad874"}], 0x1340}}, {{&(0x7f0000000ac0)=@l2tp={0x2, 0x0, @loopback, 0x3}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b40)="16a2fe11db32a1e8aed12830964aff7549c57bb739c335abd2af23cc77d9216cec4d39048abd69665d780a144649ce4885d544d8d3d42d3ba4275cb9bc560da7de11cdb14553d257b06fca2b651276bc6f81ec449dd11609e1e2421f6d8694f2cf5f6f57cacefdc47f57cc3b9e13a31b958303ad1917c28771e24519da26a2dbc0cf01a6d7a48ea1aba1040d5f572413f06d57", 0x93}, {&(0x7f0000000c00)="3dbd9a838b7ae33fb1fcb15a02e5389fa4d2b611eff460e68c31bad3ed410d4e25e8f629c166a1ab81f83832115336a4198915d18ef9d15aeaa5c4e88ff6ddd992eb960b6de181b96695b50e65ceb53e8a354ea457b204f3293f10c8521287c445d4ad7ce540e7ea3d09b2a53ba6f7b753d0a798c17d19e20f149bb0c2cd3e1bda16ffb1d3e409c14d7eac2a7b0f219a2c2ef733ba30035c7384e8c7e8d494ca2d2712950481b45d52631b83e2f3b063237d8fa9267bef", 0xb7}, {&(0x7f0000000cc0)="edd33e6e3f486a23994682cbe77970e09f209375906ab9d10b491efea58157636ce6b4d820fb8fae3fbd09da98d5e52cf859d50628446cb988b54c3643f212a496e2fa124e41f915e1a858061c9cda0d44cf56fb5135424e5b06fe63b4225198d6d9f33171d9da13b9242d5b36e19d04", 0x70}], 0x3, &(0x7f0000000d80)=[{0xc8, 0x10a, 0x9, "6bd96f7065f3fd96ac591230a1ed7f0e076fc72d20fed9c8d3d33547518ef6b120144008f4fd65feae6354d5aea9376077c0c8d6950a14c0aa4dbc3dce51ff6199df06a0f85befc791afd2e70aa2af1c9e96e37507b759e193fc786f5771da7665616b2e256f7097d0477f530895d301868359975f29539895a79ee0437e2b068f35c757b5b49e70fb9b31d6565567cf820b5013ece41aa1e03118f4c2761816e6eebaa51ad8cd38c6158c812e1596d7c7ed44b1a6eb3e"}, {0x50, 0x1, 0x7, "32a9da568010e1e56e088d519af0b6649440662198aa84acd3bd1993584a8f3113f4cd683e23309d266cea491521f74630bd006e9d596a8660cb6fd9fc"}, {0x98, 0x117, 0x1ff, "10985a47993e720ccaa1244e05b335ae4cd7331a603484819b9106916eb8d3cc7235631dc59a0bd93605a2811a65c4a3091eeda97a9cc3d61862e69244e5fe34f2abe2911739b24c9194e11ac4a37504730a07435bcc05fe9433747f9284dc38f293dcfa177a94f324ae21069623abba9ac62ac59421ea72b017dd69541ac58365"}, {0xa8, 0x118, 0x397c8585, "d46e4adf96a701d5ba23357cf630cac8a680da64649be42129f96765f40cbf3c5e18f24b4cd60c9a7a7f09c3b274822ccb86ae77c939eee530e30cfed310ba08605e80c7c288c4f5d3d389d04531f10678ba378973f76a23a6a45e8639496c4f9bccee41ac8108ac1e51b98f1ddc167460f8a15406f58d5d5b604922e58afe3646c503aaffde7c39855a0b9b392fad0b3bcbe9b1405f2f"}, {0x48, 0x103, 0x2, "809487fbf39f8d3d4a0fdfb63b3e9320daebbbf1fb068862409339ed5cab1b6fec5d8451027d2cafe23eedf34b6591f5137b79ce707bcb"}], 0x2a0}}], 0x4, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f00000045c0)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89378d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276782368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55155dc5bc791def3551c1a4191c6d230833c8d0a060000005847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161cde21b1187f39c292cfe325a6499a7226cc5e4fff54a3ae0c882233d0596b24d6c47f00de1c30cafb92f9cb732f466873ba21ce63cd093c05392c0ca280cac065ebfc82b76a5e43535ed1215b06192b80157d116e33f21efa283a1dea730aa660f6f30e08c18d575a90f74b4bae839f300"/364, @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000804040000000000"], 0x30}}, 0x0) [ 514.667546] selinux_nlmsg_perm: 5 callbacks suppressed [ 514.667565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3600 sclass=netlink_route_socket pig=24067 comm=syz-executor.1 20:23:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000006700ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 514.708025] validate_nla: 18 callbacks suppressed [ 514.708036] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010105f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESOCT, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYBLOB="0008bb028f60ff456119eda97fa5575e71c7910d84ec2c59170458c9392851e051f8503c8f11ad4d621037c47942bf2e35f9e0534a28b47740e2d04508f2d0eed68a640ac7cfa7e505f07f057c583c676d14afcbabb44b4fd965a9eafa413a7eba0f773319ab2fcd44f0aaebb2029ae8faf205c2273b3b3c58445e81d2f7d79ad8bfe0b292f8a274f4788e90ff70f06e73fd28f9acee63a312358adaecced0cabe9bd8265eaa15e303bbc1d536c4533b01ded23866f337e6ded4745964d525661163762ab1a0582104cdd6884f95229601e3bade7cd7ad"]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3000000025e8c5855ebfbe0932c0e636b61000010800f651078cf2a600000000000000007aeb5f41fbd090427f4d3a0ff7858a9a2321c9a9a8f339d04b3db9ac3820c19e5f8fb4e895d902f4fd6670cdfa74", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 514.830090] device macvtap339 entered promiscuous mode [ 514.842051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4112 sclass=netlink_route_socket pig=24082 comm=syz-executor.1 [ 514.863887] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 514.890644] audit: type=1804 audit(1578601397.326:289): pid=24081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/599/bus" dev="sda1" ino=16551 res=1 20:23:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dfffffff00000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 514.936427] device macvtap365 entered promiscuous mode [ 514.947940] protocol 88fb is buggy, dev hsr_slave_1 [ 514.957973] audit: type=1804 audit(1578601397.386:290): pid=24081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/599/bus" dev="sda1" ino=16551 res=1 20:23:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010125f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 515.104499] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 515.158643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4624 sclass=netlink_route_socket pig=24098 comm=syz-executor.1 [ 515.175464] device macvtap366 entered promiscuous mode [ 515.184669] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 515.238781] device macvtap340 entered promiscuous mode [ 515.256675] protocol 88fb is buggy, dev hsr_slave_0 [ 515.261851] protocol 88fb is buggy, dev hsr_slave_1 [ 515.267145] protocol 88fb is buggy, dev hsr_slave_0 [ 515.272212] protocol 88fb is buggy, dev hsr_slave_1 [ 515.414088] audit: type=1804 audit(1578601397.846:291): pid=24103 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/599/bus" dev="sda1" ino=16551 res=1 20:23:17 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0xb) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001102ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010485f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef10000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:17 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x2000, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @window={0x3, 0x1, 0x3f}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @sack_perm, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 515.549601] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 515.549770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18448 sclass=netlink_route_socket pig=24110 comm=syz-executor.1 [ 515.609156] device macvtap367 entered promiscuous mode 20:23:18 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000380)=[@mss={0x2, 0x1}, @timestamp, @mss={0x2, 0x9}, @window={0x3, 0x85b3, 0x2}, @mss={0x2, 0x4}, @sack_perm, @timestamp], 0x2b7) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r5, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r6, @ANYRESHEX=r2, @ANYRESDEC=r7, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r5, @ANYRESHEX=r5, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r5) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r9, r9) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b8439000000000008000400fc"], 0x30}}, 0x0) [ 515.632406] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 515.641158] audit: type=1804 audit(1578601398.076:292): pid=24117 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/600/bus" dev="sda1" ino=17931 res=1 20:23:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000104a5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:18 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) setsockopt$packet_buf(r3, 0x107, 0x2, &(0x7f0000000180)="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", 0x1000) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 515.706270] device macvtap341 entered promiscuous mode 20:23:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001103ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000003f20000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 515.807165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18960 sclass=netlink_route_socket pig=24127 comm=syz-executor.1 [ 515.828147] audit: type=1804 audit(1578601398.266:293): pid=24126 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/601/bus" dev="sda1" ino=16552 res=1 20:23:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000104c5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 515.949787] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001104ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 515.984917] audit: type=1804 audit(1578601398.416:294): pid=24138 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/601/bus" dev="sda1" ino=16552 res=1 [ 516.035900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19472 sclass=netlink_route_socket pig=24144 comm=syz-executor.1 [ 516.091415] device macvtap368 entered promiscuous mode [ 516.111182] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 516.130789] audit: type=1800 audit(1578601398.466:295): pid=24126 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16552 res=0 20:23:18 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r3, r5, 0x0, 0x80001d00c0d0) kcmp(0x0, 0x0, 0x0, r3, r4) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x10) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x355141, 0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) r10 = dup2(r3, r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r10, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r11, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010605f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 516.257604] audit: type=1800 audit(1578601398.466:296): pid=24138 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16552 res=0 [ 516.419259] device macvtap342 entered promiscuous mode 20:23:18 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000000)={0x0, 0x1e8, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038c50d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x80) close(r0) shutdown(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) socket$inet6_sctp(0xa, 0x5, 0x84) [ 516.440112] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 516.447861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24592 sclass=netlink_route_socket pig=24157 comm=syz-executor.1 20:23:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010685f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001105ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 516.485089] device macvtap369 entered promiscuous mode 20:23:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef20000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000001200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 516.609258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26640 sclass=netlink_route_socket pig=24169 comm=syz-executor.1 20:23:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001106ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 516.662747] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 516.755593] device macvtap370 entered promiscuous mode 20:23:19 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ppoll(&(0x7f0000000140)=[{}, {r4}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000106c5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 516.944294] device macvtap343 entered promiscuous mode 20:23:19 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0)=[@timestamp, @sack_perm, @mss={0x2, 0x5}], 0x2000020d) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}]}}], 0x1, 0x4040800) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000400)=ANY=[]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r10 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r10, r10) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, 0x0, 0x0) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000000000040000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4050}, 0x0) 20:23:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef30000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000001f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 517.025768] device macvtap344 entered promiscuous mode 20:23:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001107ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef40000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 517.074404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27664 sclass=netlink_route_socket pig=24191 comm=syz-executor.1 20:23:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010745f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 517.174717] device macvtap371 entered promiscuous mode 20:23:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000002000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:19 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @window={0x3, 0x20, 0x1000}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be837e9b7ce16f8a67f7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db286ebdfdb4b911cd507fc6f5083e3e37967932a42e71b41d1acee650cce9b0e70e6f5e0227b5e6a225236174f4426814bdf94205f9c692e462df36486a33bce22adb94271e0a13b0bea5d54e47d97eb7470181ebc0c93517562788af84f87b33d8f1a4f02bebd01600ab61a91af3340c674ebebaccf4f455ca2004608850"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @sack_perm, @timestamp], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x16, 0x0, &(0x7f0000000340)) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = socket$inet6_sctp(0xa, 0x801, 0x84) r13 = getpid() sched_setscheduler(r13, 0x5, &(0x7f0000000380)) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, 0x0, 0x0) ftruncate(r14, 0x200004) sendfile(r11, r14, 0x0, 0x80001d00c0d0) kcmp(0x0, r13, 0x0, r11, r12) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32=r12, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r10]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r15 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r15, r15) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30749a57aaad0000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 517.224855] device macvtap345 entered promiscuous mode 20:23:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000001f50000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e28000000110fffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 517.315886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29712 sclass=netlink_route_socket pig=24210 comm=syz-executor.1 [ 517.403144] device macvtap372 entered promiscuous mode 20:23:19 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x402801, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x400, 0xa, 0x101, 0x39}, 0x10) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2300000032000903000000000000000000000000140001007afd9fa114b0b851919861b7e6100001000a0001007065646974000000fe198a4105205124f8f243c22dac9c1e4be6f218a486811037130a19884b607c90cba3e3008e7ed83a"], 0x28}}, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x40000, 0x0) sendfile(r1, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000280)=[{}, {}, {r1, 0x2089}], 0x3, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000240)={'rose0\x00', {0x2, 0x4e22, @multicast2}}) 20:23:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000022000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000107a5f0d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001128ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 517.585200] device macvtap346 entered promiscuous mode 20:23:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef50000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 517.697016] device macvtap373 entered promiscuous mode [ 517.735435] nla_parse: 7 callbacks suppressed [ 517.735445] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.3'. 20:23:20 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) sendmmsg(r4, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0xffffffb8}], 0x10000000000001b9}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000440)="279eae64d5a09a8c81fe640c4254d228f5009ffd9d64493b4008a561c04cd46707a47cc18e217b139fcd2eccb32bc5a4e7830c8a80bcec3ec15bd45c71223c208d06ce90be6974d25960ec9ee4c5649368b33b0217a5cf61fc37c85e535c90687e1f167eb64254d11b324537f53ccfca9f5e441b34c3fff613ca8c821676e357fbf293c9fc4e63eab5e9c7f11d2a2ed8a4f9a830917d"}], 0x0, &(0x7f00000007c0)=[{0x0, 0x182, 0x1, "6fdec9dfac185a5eec9efe82b2cad3c780a913cb28ec2e54206b50fff4a18c2a0b13d5a5b76f37614e2f53319e3940d6125c3cdd7880f0d935f454b7dc85987a90488b1dcf7023a966e191f8f60d184689e31e038f518a15e952736988abe121f517b4e37cc75a21ee1ed3c7e8836cdd115b1dc163102b7815a62eec100a539d6443d0dac81279cac1636de6492aa14d5f6446e39ff52512d685e5c5ccbfc631562877509d32d837ae520f88"}, {0x0, 0x113, 0xffffffff, "e4dcb526dcef4def7953aae6e646fb7683da3206025b7d5a78cd82ea94820a4a7ef21d084093ee1ff3a36de623d4d6f6e260ed95874748df0b26596de73f99bb2ec4c827ae8baec87abf9567a17343cfe3b6001fabdfdaef48b83cb37291345c232c1857a14e198cd71b29c5b30ee6011648b86397aa801f7d9ae0e933321cee234c16620e98747e382e1efb98496c372646a5eead22971d37a43645d9f05769c80b848a24ad2a23cdb7fc863361bb231731e3df90d309d49ac2fd052ead3da00e5bc7a3ec84606201589a44c535d16946fdea849d643a8f30e3"}, {0x0, 0x29, 0x8, "dca59c77a224b39e4063aa382de000ff36baf717d6397a0d773ce03c0c4eed9c096a49171485979710678ca7784926f067e494aeafc52712ed8ac3bc05a55646a5d08a490ea39226d1188f94cb3adf5cca9c684b9116e08e732aa266b44bd5c0eee734e7c4d08becd59b7b9cd2d3932a24e5540c1cd650fde5c089c185260ad13bde2511e485880752d1d65091e72c0f6b6cdb9ca34eff80c1a5a2affe65aca3198172723ca8c8b88e2cdb4d80a14952bc323c0e208f"}, {0x0, 0x113, 0x146, "07fc0184e25d334e4308c78d3655f875aacce183257261b5db8f6731d8801dfd14e77067b574650e8bcf618c66dd2d5a72be3d3513c5b60f065d9bb5c70936decad7bb01744d6668c6a881aa73c4f5eb265ac12743f0cb79938ba14a89ab18dbec2f8b1cf6d5d25dcf5bdf16d51f75475a733147faa83cdfa24ea73637faba82f8f280a0ef2467548420728b9f70471deaae5487321cf62a651ab000ac1b90cdbe7308667dc04b6151b9c4d440a5fab965ac32ebf2d97f755f7887fa701971d5cd60c7bc3644e1370d9cb82c0c2db9"}, {0x0, 0x0, 0xfff, "ef6ca35a8bcf3f10342254979c8410ecfa34ea61607d999615b0f827e8091149c9f7de6bfab7ceb6f727d09476fa88695cc6ab824e17bf39b4f67492907270211f2f846f854cc6f5a736335863cc2448cbc882013d7bafc75a9ae7915432d7e5c39bfe51ac93a1dc39cd5d31ed354c038962eaa153156e0e01db64a4d031d12c0cce21ee18b9de56475aa4abee91c56e80db5cb4ec75ae2c904ba413726c2a238303597fd748b30d750c3079a526a0"}, {0x0, 0x109, 0x3, "e4ae832e44369d2968450dbebf0e61f3c796c62e58451bb0366612a8a4f7ed16debaa1886da0a660deabee11cdeb44cafc5a6627eea99f786154ad20859387d9aac0079d3cb2f3fed1ddb7034641718d403419f1e78f220bba080ba51c"}]}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r5, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r6, @ANYRESHEX=r2, @ANYRESDEC=r7, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r5, @ANYRESHEX=r5, @ANYBLOB="a365fb9d05e21734959fa0026ea2fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89370092042d332b978d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161caff4fdd46eb7048d5c6ef12a096679ba4914e104b521e86fa74eb114fc2c7db123ab071a225be8be3310e8432f40f50c1936c5ae67b9587c64ba60152ac559052d1309454748341ab84e531097c142eda33832689b1b47af8", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r5) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r9, r9) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400000000001e450aa98f141cbd4669732f89e7fc10df0aa9dfb1709f669acd22058607fd81aaca698ce527159e243d4089031c81d82755eab726d350d031f163816aa2834a4e5d32afdcea50f7cb22fb0ae0f2b9b27aefc69eac188ceaee7f881da4b988ed"], 0x30}}, 0x0) 20:23:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001003e00d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 517.782460] tc_dump_action: action bad kind 20:23:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000022400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001148ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 517.961483] device macvtap347 entered promiscuous mode 20:23:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000250d0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000003f60000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 518.113996] device macvtap374 entered promiscuous mode 20:23:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e28000000114cffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 518.178106] device macvtap46 entered promiscuous mode [ 518.226446] device macvtap348 entered promiscuous mode [ 518.361043] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.3'. [ 518.403151] tc_dump_action: action bad kind 20:23:20 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x0, 0x8, 0xf919, 0x3ff, 0x81, 0x9]}, &(0x7f0000000040)=0x10) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:20 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x600202, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000003c0)={0x2, 0xc, 0x4, 0x1, 0x7fffffff, {}, {0x5, 0x4, 0x53, 0x6, 0x7, 0x2, "cf31c1b9"}, 0x4, 0x3, @offset=0x3f, 0x400, 0x0, 0xffffffffffffffff}) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000580)=0x1, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}}, 0x20000000) close(r3) shutdown(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r5, @ANYRESHEX=r3, @ANYRESDEC=r6, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r4, @ANYRESHEX=r4, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r7]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r4) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r8, r8) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f090700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000003f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001160ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef60000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0a0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 518.511672] device macvtap349 entered promiscuous mode [ 518.572660] device macvtap375 entered promiscuous mode 20:23:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001168ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef70000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f100700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e28000000116cffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 518.840802] kauditd_printk_skb: 9 callbacks suppressed [ 518.840822] audit: type=1804 audit(1578601401.276:306): pid=24303 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/605/bus" dev="sda1" ino=17942 res=1 [ 518.899734] device macvtap350 entered promiscuous mode [ 518.950765] device macvtap376 entered promiscuous mode [ 518.965619] audit: type=1800 audit(1578601401.376:307): pid=24287 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17942 res=0 20:23:21 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r4 = open(&(0x7f0000000780)='./bus/file0\x00', 0x141042, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r5, r8, 0x0, 0x80001d00c0d0) kcmp(0x0, r7, 0x0, r5, r6) setsockopt$sock_void(r6, 0x1, 0x12, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) r9 = accept$alg(r4, 0x0, 0x0) preadv(r9, &(0x7f0000000680)=[{&(0x7f0000000000)=""/8, 0x8}, {&(0x7f0000000180)=""/189, 0xbd}, {&(0x7f0000000040)=""/53, 0x35}, {&(0x7f00000000c0)=""/38, 0x26}, {&(0x7f0000000240)=""/173, 0xad}, {&(0x7f0000000300)=""/194, 0xc2}, {&(0x7f0000000400)=""/216, 0xd8}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/179, 0xb3}, {&(0x7f0000000100)=""/50, 0x32}], 0xa, 0xffffffffffffffff) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:21 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010c00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) 20:23:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef80000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f120700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001174ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 519.175897] device macvtap377 entered promiscuous mode [ 519.188593] audit: type=1800 audit(1578601401.376:308): pid=24303 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17942 res=0 [ 519.254767] device macvtap351 entered promiscuous mode 20:23:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 519.303918] audit: type=1804 audit(1578601401.596:309): pid=24316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/606/bus" dev="sda1" ino=16569 res=1 20:23:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f140700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022ef90000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e28000000117affffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 519.479254] audit: type=1804 audit(1578601401.656:310): pid=24316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/606/bus" dev="sda1" ino=16569 res=1 [ 519.570761] device macvtap378 entered promiscuous mode 20:23:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 519.640911] device macvtap352 entered promiscuous mode 20:23:22 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fc9dfd1a00009038d00d5e73ea9495f016012e242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b728518478710154627ca085e7cd6c882d05af6f1f9c99c028fd3316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x100400, 0x1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r6, @ANYRESHEX=r2, @ANYRESDEC=r7, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r9, r9) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:22 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022efa0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 519.714400] audit: type=1804 audit(1578601401.966:311): pid=24316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/606/bus" dev="sda1" ino=16569 res=1 [ 519.754218] device macvtap47 entered promiscuous mode 20:23:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f250700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 519.798503] validate_nla: 24 callbacks suppressed [ 519.798513] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 519.864280] audit: type=1804 audit(1578601402.016:312): pid=24316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/606/bus" dev="sda1" ino=16569 res=1 20:23:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba18a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:22 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000380)=[@sack_perm, @sack_perm, @mss, @sack_perm], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000380), 0x0) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 519.919527] device macvtap353 entered promiscuous mode [ 519.936870] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022efb0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 519.970286] device macvtap379 entered promiscuous mode [ 519.982687] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000034c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 520.051167] device macvtap48 entered promiscuous mode [ 520.065434] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f390700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 520.093471] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba5fa0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 520.160294] device macvtap354 entered promiscuous mode [ 520.169985] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022efc0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:22 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b0803767c593f0652a825f91511e4007242f20a00b5f9a7715919b08000000f8aaa4f2dd7b72851847021015d6c882d0316ede12e8d83e63e03b28b9b82e94c1bf0e36f56f786a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db2819a512cb566ffcc15d5daaa0fd4937c4a84860466ea5e88729d1b3c105463ccb9c5266b453790dfb493b089c4a5f44fb42ebfa1bc5807d195bb85e66a87cf31a4722e4cb6c2205aa4249fcc71d4d2c67cb4f001a8bc7ba13a44cddb175ba70dc722826012d5bc2e3053cd676393f3b3582efac20d3cd5bc94f26e48279b22d8c159867b4d65294dd5de8cc61f858c73883895735faa2998d6e748a7a30e3"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES64=r2, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x44000050}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 520.223629] device macvtap380 entered promiscuous mode [ 520.251185] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f520700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 520.271847] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 520.359531] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 520.434209] device macvtap355 entered promiscuous mode [ 520.456135] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba1670aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f630700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dfffffffc0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) flock(r2, 0x2d6712f609fc458c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:23 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b7743173eb91767710adab2332b97c7e72cd437b4d8d68d921f7c0607000000769ada29658ac4b5103d0928bc5abeb05f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f87c95ac7739448d061e672fce5f0f882ce6e91d7fb6beb31145b89865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xfffffffffffffd71) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 520.673262] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 520.726295] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 520.736553] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 520.754448] device macvtap356 entered promiscuous mode [ 520.779767] device macvtap381 entered promiscuous mode 20:23:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022efd0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa5f0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x20, 0xfe, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x7010, 0x0, 0x4000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0xffffffffffffffb1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010004b4f78ac6e25b895adab01d3832a6fd20108000800"/36, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000004d000000"], 0x30}}, 0x0) [ 520.907840] audit: type=1804 audit(1578601403.346:313): pid=24409 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/608/bus" dev="sda1" ino=17946 res=1 [ 520.998328] device macvtap357 entered promiscuous mode [ 521.022286] device macvtap49 entered promiscuous mode 20:23:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022efe0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 521.052348] device macvtap382 entered promiscuous mode [ 521.067249] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0600"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x0) [ 521.139677] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0200000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 521.243156] device macvtap50 entered promiscuous mode [ 521.282392] device macvtap358 entered promiscuous mode [ 521.341170] device macvtap383 entered promiscuous mode [ 521.398254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 521.430718] audit: type=1804 audit(1578601403.866:314): pid=24406 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/608/bus" dev="sda1" ino=17946 res=1 20:23:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000fffe0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:24 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x923d, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) ioctl$IOC_PR_PREEMPT(r7, 0x401870cb, &(0x7f0000000040)={0xffffffffffffffc0, 0x0, 0x800}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xf) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000000)={0x5, 0x7ff, 0x55d, 0x7f, 0x1}) 20:23:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0300000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:24 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0900"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 521.699600] device macvtap51 entered promiscuous mode [ 521.750366] device macvtap359 entered promiscuous mode [ 521.769553] device macvtap384 entered promiscuous mode [ 521.781821] device macvtap52 entered promiscuous mode 20:23:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 521.808977] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0400000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dfffffffe0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 521.895751] audit: type=1804 audit(1578601404.326:315): pid=24462 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/609/bus" dev="sda1" ino=16579 res=1 [ 521.935445] device macvtap53 entered promiscuous mode 20:23:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d1000"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.114191] device macvtap385 entered promiscuous mode [ 522.122921] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.169173] device macvtap360 entered promiscuous mode 20:23:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000fff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.227613] device macvtap54 entered promiscuous mode 20:23:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d1400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.421704] device macvtap386 entered promiscuous mode [ 522.456349] device macvtap55 entered promiscuous mode [ 522.524149] device macvtap361 entered promiscuous mode 20:23:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r2, r5, 0x0, 0x80001d00c0d0) kcmp(0x0, r4, 0x0, r2, r3) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[@ANYBLOB="0800000000000000ff0700000000000002000000000000005812d13fe7f9d7f196eeaf1feaff1e2c", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="00000000000000000100"/28]) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r9, 0x0, 0x80001d00c0d0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x60, 0x80000) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0500000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:25 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0204000000008ff93961a05fe2b00cf5d2fcddfd2200009038d00d5873ea94b46f65d908513bd3a10b5f9aa6f8aaa4f2dd7b72851847871015d6c882d03a6ede12e8bf0e36f56f6a85f565c50000000000000007ed99038eab641289ec922800000000000000"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0xfffffffffffffe3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x801, 0x84) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, 0x0, 0x0) ftruncate(r13, 0x200004) sendfile(r10, r13, 0x0, 0x80001d00c0d0) kcmp(0x0, r12, 0x0, r10, r11) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = socket$inet6_sctp(0xa, 0x801, 0x84) r16 = getpid() sched_setscheduler(r16, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r15, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r15, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, 0x0, 0x0) ftruncate(r17, 0x200004) sendfile(r14, r17, 0x0, 0x80001d00c0d0) kcmp(0x0, r16, 0x0, r14, r15) r18 = socket$inet6(0xa, 0x400000000001, 0x0) close(r18) r19 = socket$inet6_sctp(0xa, 0x801, 0x84) r20 = getpid() sched_setscheduler(r20, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r19, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback, 0xfffffffc}], 0x1c) connect$inet6(r19, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r21 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r18, 0x84, 0xd, 0x0, 0x0) ftruncate(r21, 0x200004) sendfile(r18, r21, 0x0, 0x80001d00c0d0) kcmp(0x0, r20, 0x0, r18, r19) r22 = socket$inet6(0xa, 0x400000000001, 0x0) close(r22) r23 = socket$inet6_sctp(0xa, 0x801, 0x84) r24 = getpid() sched_setscheduler(r24, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r23, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r23, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r25 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r22, 0x84, 0xd, 0x0, 0x0) ftruncate(r25, 0x200004) sendfile(r22, r25, 0x0, 0x80001d00c0d0) kcmp(0x0, r24, 0x0, r22, r23) r26 = socket$inet6(0xa, 0x400000000001, 0x0) close(r26) r27 = socket$inet6_sctp(0xa, 0x801, 0x84) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r27, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r27, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r29 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r26, 0x84, 0xd, 0x0, 0x0) ftruncate(r29, 0x200004) sendfile(r26, r29, 0x0, 0x80001d00c0d0) kcmp(0x0, r28, 0x0, r26, r27) r30 = socket$inet6(0xa, 0x400000000001, 0x0) close(r30) r31 = socket$inet6_sctp(0xa, 0x801, 0x84) r32 = getpid() sched_setscheduler(r32, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r31, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r31, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r33 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r30, 0x84, 0xd, 0x0, 0x0) ftruncate(r33, 0x200004) sendfile(r30, r33, 0x0, 0x80001d00c0d0) kcmp(0x0, r32, 0x0, r30, r31) r34 = socket$inet6(0xa, 0x400000000001, 0x0) close(r34) r35 = socket$inet6_sctp(0xa, 0x801, 0x84) r36 = getpid() sched_setscheduler(r36, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r35, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r35, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r37 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r34, 0x84, 0xd, 0x0, 0x0) ftruncate(r37, 0x200004) sendfile(r34, r37, 0x0, 0x80001d00c0d0) kcmp(0x0, r36, 0x0, r34, r35) r38 = socket$inet6(0xa, 0x400000000001, 0x0) close(r38) r39 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r38, 0x84, 0xd, 0x0, 0x0) ftruncate(r39, 0x200004) sendfile(r38, r39, 0x0, 0x80001d00c0d0) r40 = socket$inet6(0xa, 0x400000000001, 0x0) close(r40) r41 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r40, 0x84, 0xd, 0x0, 0x0) ftruncate(r41, 0x200004) sendfile(r40, r41, 0x0, 0x80001d00c0d0) r42 = socket$inet6(0xa, 0x400000000001, 0x0) close(r42) r43 = socket$inet6_sctp(0xa, 0x801, 0x84) r44 = getpid() sched_setscheduler(r44, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r43, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r43, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r45 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r42, 0x84, 0xd, 0x0, 0x0) ftruncate(r45, 0x200004) sendfile(r42, r45, 0x0, 0x80001d00c0d0) kcmp(0x0, r44, 0x0, r42, r43) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x7d, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f0000000e00)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES32=r2, @ANYRESHEX=r34, @ANYRES16, @ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR, @ANYRES16=r5, @ANYRES16=r39, @ANYPTR64, @ANYPTR64, @ANYRESHEX, @ANYBLOB="08881d23fa5faa6126caa5639efb51f097bcfb4df3bdb28051c9db569493778d3463f98cafffe07b4e3bdfc3f83eaab8b9150d470cedb19861b0d4d36346d73aa3869c159e9333764544f51e2c968afb5b57bb3efa987cfb603eb5634ee903d8452fc5888f56b458d58edb2800424e428976cd7bd9779f7895830fd960f119351fa41fdb9922e56c06544af558bc6406905a67ca008000002fe77a366eb802c3e8410d1479d356d1b89a09186b7f19fc3bf57abd0ba61c49fc8c735aef7ba2fb8f8becb8000b", @ANYRESDEC=r0, @ANYRESOCT, @ANYRES64], @ANYRESDEC=r4, @ANYBLOB="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", @ANYPTR=&(0x7f0000000bc0)=ANY=[@ANYRES16=0x0, @ANYRESDEC, @ANYPTR64, @ANYRES64=0x0, @ANYBLOB="78cebcc7a0fd6b22313a6d33c3014ddb4d59d6f8e2fd0ffce242a8da687ca15219d5e461035b41c9a5c86ba3ebfad2a794edbfa7571ee17ba4fd63afbdeb22dcc00bd39d3cc702061b1356414ccac5d8dc0515d07d448739865b7047e7cb7ad1e155fb2b5510ade75eadd5244b9863cd726cdfdd1b876660a7c4a48021e340a6303b88e3e76dbfa75dabe9ddce719ba2e1c4e222ac8d9877360f52f03b0436581e23f97bbe5c20503d11684e1d39c188fba635dcfa89677fc2475a7de08ea0", @ANYPTR, @ANYRESHEX, @ANYRES16=r0, @ANYRES16=r3, @ANYRESDEC], @ANYRESHEX=r41, @ANYRES64], @ANYRESDEC=0x0, @ANYRESHEX=r1, @ANYRESDEC=r4, @ANYRESHEX=r43, @ANYRESDEC=r32, @ANYRESHEX=r5]], 0x2}, 0x1, 0x0, 0x0, 0x410}, 0x20004001) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r46 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r46, r46) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="30000075282b42c9acc0a6aff9eafef1874ba12f378652aa0010000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000a8a95127d46602da4bfe07fda94741a462ac252be499636af75fd8e4c8a8860aef92af7c657ea77fec3d915d26bbd1f138687cc26694c495fc22fd4990757fce49df99213de870f0e4dd4953b3d7cbf44c80cf14e10213b9c92133545bd5955d80a381000000000000"], 0x30}}, 0x0) 20:23:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d2400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022eff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.733775] device macvtap387 entered promiscuous mode [ 522.769186] device macvtap362 entered promiscuous mode [ 522.788528] device macvtap56 entered promiscuous mode 20:23:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.818407] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d001fffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d2500"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 522.886792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0600000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 523.030759] device macvtap388 entered promiscuous mode 20:23:25 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYRES16=r8], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="3000000010000108000000000000000000005b98d938e3f4b87274313e8fc36783a00000a765df677150672889edd6846f6cfe6a66c38e95ecc85306f26ddc7b9478ee30009dc760b69b7995f7bf5717ab6d60ea28e027ac1a7029a85777031b33f4332cf64a6f68d740c7dbf2ff0fd339770c7fa4b483b66e0f7d0661b2643967b0", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 523.088858] device macvtap57 entered promiscuous mode 20:23:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d3800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 523.166848] device macvtap363 entered promiscuous mode [ 523.233596] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 523.272091] device macvtap58 entered promiscuous mode 20:23:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) 20:23:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d88a8ffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d3900"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0700000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:26 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6791ed99038eeb64128991db28"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c95c236da25b6d22fde4bde6b26c5fb3e4093d936a20f722203a5b826615008ca12423bd2e5e9d3f5934275a73cf5547db4b2491187d2b57b1f3856084e4734ba599a0f0e52df4e0ac9f6532ebb65f2c440d69df1e603a8cb09a11f477eed8e58f0290db84c4b0a709eb17aaee1030f5a72c33520ac2140cf7a7c75f623c7a2eeb504c77402bac55edef71118e27701", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESDEC=r4, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r2, @ANYRESHEX=r2, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r5]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r6, r6) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000000004080", @ANYRES32=0x0, @ANYBLOB="0000000008001b0000000000080004000000000000000000"], 0x30}}, 0x0) [ 523.624346] device macvtap59 entered promiscuous mode 20:23:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d5200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 523.690050] device macvtap364 entered promiscuous mode [ 523.697801] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00f0ffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 523.739938] device macvtap389 entered promiscuous mode [ 523.820545] device macvtap60 entered promiscuous mode 20:23:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 523.855067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d8a0700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0800000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 523.959721] device macvtap365 entered promiscuous mode 20:23:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d7fffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 524.051907] device macvtap390 entered promiscuous mode [ 524.067764] kauditd_printk_skb: 8 callbacks suppressed [ 524.067784] audit: type=1804 audit(1578601406.506:324): pid=24558 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/611/bus" dev="sda1" ino=16590 res=1 [ 524.177001] device macvtap61 entered promiscuous mode [ 524.188625] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 524.198404] audit: type=1800 audit(1578601406.636:325): pid=24551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16590 res=0 20:23:26 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xaa4) fcntl$setlease(r4, 0x400, 0x6) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:26 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x52700b2536fb4f65, 0x68) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000400)=0x1, 0xffffffffffffffa1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r4) shutdown(r4, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r5, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r6, @ANYRESHEX=r4, @ANYRESDEC=r7, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r5, @ANYRESHEX=r5, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r5) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r9, r9) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e5f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 524.240977] audit: type=1800 audit(1578601406.656:326): pid=24558 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16590 res=0 [ 524.267886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0da00700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 524.389924] audit: type=1804 audit(1578601406.826:327): pid=24584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/612/bus" dev="sda1" ino=16643 res=1 [ 524.390963] device macvtap366 entered promiscuous mode 20:23:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0a00000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 524.473370] audit: type=1804 audit(1578601406.906:328): pid=24584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/612/bus" dev="sda1" ino=16643 res=1 [ 524.533190] device macvtap391 entered promiscuous mode 20:23:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000006000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 524.593815] device macvtap62 entered promiscuous mode 20:23:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d9effffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 524.634566] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:27 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) socket$nl_crypto(0x10, 0x3, 0x15) socket$nl_crypto(0x10, 0x3, 0x15) close(r1) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r5, r8, 0x0, 0x80001d00c0d0) kcmp(0x0, r7, 0x0, r5, r6) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, 0x0, 0x0) ftruncate(r12, 0x200004) sendfile(r9, r12, 0x0, 0x80001d00c0d0) kcmp(0x0, r11, 0x0, r9, r10) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, 0x0, 0x0) ftruncate(r14, 0x200004) sendfile(r13, r14, 0x0, 0x80001d00c0d0) r15 = socket$inet6(0xa, 0x400000000001, 0x0) close(r15) r16 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r15, 0x84, 0xd, 0x0, 0x0) ftruncate(r16, 0x200004) sendfile(r15, r16, 0x0, 0x80001d00c0d0) sendfile(r16, r10, 0x0, 0xfffffffffffffc04) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0db10700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:27 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9, 0x0, 0x0, 0xff00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000400)="590264b55ce37b112259a749758976502fa29acdf426d8753d1bbaa4fe2dfcc3fc51dc755661f10d718d34612868cfd1eb40fb3e8b09fe70df5d36465d94036234ce8b7a5a735e75ad5da51b11027aef4adfbc426c79e1cb14e2376666b441eee72f300324a6e0cde70a483400126cb309db5549841e3eb8f736dbc3ea7dc65f59627ec374641fe3fc6d5ed788cbc7fbf021e7fbacaa28e9e3f113a364cfa9e37638fa42ec5813a740e7df51ce8e8944de55924eb07a95fc98d0794d57b87ca686da84177a0b33c18eaa", 0xca}], 0x1, 0x0, 0xffffffffffffff64}}], 0x1, 0x90) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="e2e9923f043f811f7dcff74351891b4693bcd4507b6ccb94ed9689625ce623e0eb2d261a7f23f449b03fe57a53312f4f9c14e70f1425b1b2102951570b2f1bc5dc360df1f9"], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r6, r6) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 524.764739] device macvtap392 entered promiscuous mode 20:23:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0b00000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 524.837211] validate_nla: 36 callbacks suppressed [ 524.837222] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 524.918796] device macvtap367 entered promiscuous mode [ 524.959565] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 524.989801] device macvtap393 entered promiscuous mode 20:23:27 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c5b5a63d761d9b5a00d2d3bdcac52f68e1dc6591ed99038eeb"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dc3ffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 524.994970] audit: type=1400 audit(1578601407.426:329): avc: denied { create } for pid=24605 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 525.001538] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 525.094069] device macvtap63 entered promiscuous mode [ 525.106760] audit: type=1804 audit(1578601407.486:330): pid=24614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/613/bus" dev="sda1" ino=16616 res=1 20:23:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 525.143715] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 525.171070] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 525.201474] audit: type=1804 audit(1578601407.636:331): pid=24614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/613/bus" dev="sda1" ino=16616 res=1 [ 525.269147] audit: type=1804 audit(1578601407.696:332): pid=24614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/613/bus" dev="sda1" ino=16616 res=1 [ 525.282520] device macvtap394 entered promiscuous mode 20:23:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 525.298424] audit: type=1804 audit(1578601407.736:333): pid=24614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/613/bus" dev="sda1" ino=16616 res=1 [ 525.337466] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0c00000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 525.455491] device macvtap368 entered promiscuous mode [ 525.511492] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:28 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 525.572764] device macvtap64 entered promiscuous mode [ 525.604806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 525.635945] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 525.665685] device macvtap395 entered promiscuous mode 20:23:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070300"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0de4ffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0d00000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:28 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001001000000001b280000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000080000008001b00000000000800000000000000"], 0x30}}, 0x0) [ 525.920745] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 525.969474] device macvtap396 entered promiscuous mode [ 525.977695] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 526.025958] device macvtap65 entered promiscuous mode [ 526.045080] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:28 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) r8 = geteuid() r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, 0x0, 0x0) ftruncate(r14, 0x200004) sendfile(r13, r14, 0x0, 0x80001d00c0d0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) r20 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r21, 0x0) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r23, 0x0) r24 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r25, 0x0) fsetxattr$system_posix_acl(r5, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x4}, [{0x2, 0x8, r7}, {0x2, 0x7, r8}, {0x2, 0x6, r10}, {0x2, 0x9, r12}, {0x2, 0x4, r15}], {0x4, 0x5}, [{0x8, 0x4, r16}, {0x8, 0x0, r17}, {0x8, 0x1, r18}, {0x8, 0x0, 0xee01}, {0x8, 0xe, r19}, {0x8, 0x1, r21}, {0x8, 0x4, r23}, {0x8, 0x4, r25}], {}, {0x20, 0x2}}, 0x8c, 0x0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 526.124851] device macvtap369 entered promiscuous mode [ 526.209543] device macvtap397 entered promiscuous mode 20:23:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0df0ffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0e00000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:28 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, 0x0, 0x0) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r11, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYRES32, @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESDEC=r4, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r2, @ANYRESHEX=r2, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r5, @ANYRESOCT, @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r12 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r12, r12) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 526.365003] device macvtap66 entered promiscuous mode 20:23:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c1000000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070500"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 526.483916] device macvtap370 entered promiscuous mode [ 526.563120] device macvtap398 entered promiscuous mode 20:23:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dfcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 526.613349] device macvtap67 entered promiscuous mode 20:23:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070600"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c1100000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 526.794042] device macvtap371 entered promiscuous mode [ 526.902767] device macvtap68 entered promiscuous mode [ 526.998891] device macvtap399 entered promiscuous mode 20:23:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c1200000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dfeffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:29 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a77b8919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x801, 0x84) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, 0x0, 0x0) ftruncate(r13, 0x200004) sendfile(r10, r13, 0x0, 0x80001d00c0d0) kcmp(0x0, r12, 0x0, r10, r11) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = socket$inet6_sctp(0xa, 0x801, 0x84) r16 = getpid() sched_setscheduler(r16, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r15, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r15, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, 0x0, 0x0) ftruncate(r17, 0x200004) sendfile(r14, r17, 0x0, 0x80001d00c0d0) kcmp(0x0, r16, 0x0, r14, r15) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000740)=ANY=[@ANYRES32, @ANYRESDEC=r3, @ANYRESHEX=r2, @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT=r7, @ANYRES64, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64, @ANYPTR, @ANYRESDEC=r11, @ANYRES16, @ANYPTR64, @ANYRES64, @ANYRES16, @ANYRESDEC=r15, @ANYRES16=r1, @ANYPTR], @ANYBLOB="15b7f5775a3d8ec02021e18e4c3ca1cb3e8800a8410d71ac1fabda3abfb752563585b21c6e8372299e9bcc8e3ab750de221ec8e35bc77e9315c77dbae706a48d851d45f3ff883275145e6628fa8ed27cb5d9a5af2cbf7438d153485706b2fabcbf71f65b200420da352fdb99780983dc0e61fa9073ef3ef264eb51edff42f04481ae9ce85bfe9f64b7b84378a69fefbe01339eeb0bf661b29e0c76d0c472cbef1c0dee044cfff6b0121c8d2052830882b83647ff698e9a528c021b9e1b816f5556abaa9e277c0854"], @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64, @ANYRESHEX, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r5]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x618) close(0xffffffffffffffff) r18 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r18, r18) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:29 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x5, 0x40) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0)=0x5, 0x4) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000000)={0xffffffff, 0x1, {0xfffffffffffffffd, 0x3, 0x3, 0xb0cb614ffa48e96a, 0x3}, 0x6}) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 527.181685] device macvtap69 entered promiscuous mode 20:23:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c5f00000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 527.297944] device macvtap372 entered promiscuous mode 20:23:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070900"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 527.377362] device macvtap400 entered promiscuous mode 20:23:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dffffffffa001000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:29 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374027242f20a00b5f9a7715919be8c0c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcaab3ed26b0d9a9a3a99038eeb64128991db280000000000000004000000000000000099eadff43aa37a6c15b81ad1032b40676973b55eda900e4b78daa5a541154e4d243c"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0902000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 527.551105] device macvtap70 entered promiscuous mode 20:23:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000006800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 527.660769] device macvtap373 entered promiscuous mode 20:23:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0903000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dffffffff87a0000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 527.815120] device macvtap401 entered promiscuous mode [ 527.871298] nla_parse: 7 callbacks suppressed [ 527.871309] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:30 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db289a5e006f7ac71151005c"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x16, 0x0, &(0x7f0000000340)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESDEC=r4, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r2, @ANYRESHEX=r2, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r5]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) 20:23:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 527.942840] device macvtap71 entered promiscuous mode [ 527.971713] device macvtap374 entered promiscuous mode [ 528.063477] device macvtap402 entered promiscuous mode 20:23:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0904000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070c00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:30 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x111000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r0, &(0x7f0000000180)="1e376676f6293086b6f4b7e3c3c5569b31fdfc3e1a7115de7689a0a4c8001a8872dd77524e555ab5c8999d42eebd0988ee395ebc734fd44bd35f82cb78a63a02674ff4855b20a7f73b78527b1bce84d288adb1317df3a2714ca793e049cf390ac1c0292b2b0fe14fff739834b0853846e08f81ffffd01adb2a38ed12c8a36d5cbf043057eab9d8bb62491699ac72135abbd68509e7269ac64a28b744a589ce52171d756018a4da179747a08d7bf4f736abefa7160047d6e0502286e8e7", &(0x7f0000000240)=""/143, 0x4}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x10000) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x4, 0x3, 0x8, 0x6}, 0x10) ftruncate(r0, 0x200004) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ftruncate(r3, 0xffffffffffffff7f) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r0, 0x0, 0x7) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:30 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYRES64, @ANYRESHEX=r6]], 0x2}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000a31f910cecaae249fe420f6a0ad25eaeeadf8df3f3dda4d33dd85347783f525c5abe4830451e85655985306db32c66274f6dd3ad5830e5614c8763bb1d2a1b199e3729f86f71cce5c6312a15831e39f13a8c08aa9f48baad417c12afdd03f9e93c9b1044ca7254787c032a0347c16d16dcc65c951dedfb6656e8244e92ddba4c456c3ab6f4de70b8f66c7106d6272f14b608569729147c12d33184d054c71ce8"], 0x30}}, 0x0) [ 528.206364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 528.243489] device macvtap72 entered promiscuous mode [ 528.264396] device macvtap403 entered promiscuous mode 20:23:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070e00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 528.319451] device macvtap375 entered promiscuous mode 20:23:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0905000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 528.530116] device macvtap73 entered promiscuous mode [ 528.614140] device macvtap404 entered promiscuous mode 20:23:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d071000"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 528.650969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:31 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 528.728922] device macvtap376 entered promiscuous mode 20:23:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0906000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 528.849024] device macvtap74 entered promiscuous mode 20:23:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000003400000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 528.875010] device macvtap405 entered promiscuous mode 20:23:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d071200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 528.947308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 529.040912] device macvtap75 entered promiscuous mode [ 529.096042] device macvtap377 entered promiscuous mode [ 529.168928] kauditd_printk_skb: 8 callbacks suppressed [ 529.168951] audit: type=1804 audit(1578601411.606:342): pid=24781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/616/bus" dev="sda1" ino=16557 res=1 [ 529.215848] audit: type=1800 audit(1578601411.646:343): pid=24820 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16557 res=0 [ 529.237719] audit: type=1800 audit(1578601411.646:344): pid=24781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16557 res=0 20:23:31 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000006c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0907000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dffffffffa000800000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 529.395241] device macvtap406 entered promiscuous mode [ 529.444778] device macvtap76 entered promiscuous mode [ 529.477345] device macvtap378 entered promiscuous mode 20:23:31 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r5, r8, 0x0, 0x80001d00c0d0) kcmp(0x0, r7, 0x0, r5, r6) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r12, 0x0) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = socket$inet6_sctp(0xa, 0x801, 0x84) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r14, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r14, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r16 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, 0x0, 0x0) ftruncate(r16, 0x200004) sendfile(r13, r16, 0x0, 0x80001d00c0d0) kcmp(0x0, r15, 0x0, r13, r14) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r18) r19 = gettid() r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r21) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r23, 0x0) r24 = socket$inet6(0xa, 0x400000000001, 0x0) close(r24) r25 = socket$inet6_sctp(0xa, 0x801, 0x84) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r25, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r25, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r27 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r24, 0x84, 0xd, 0x0, 0x0) ftruncate(r27, 0x200004) sendfile(r24, r27, 0x0, 0x80001d00c0d0) kcmp(0x0, r26, 0x0, r24, r25) r28 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001600)=0x0) r30 = getegid() sendmsg$unix(r4, &(0x7f0000001700)={&(0x7f0000000000)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000600)="25213e20cc7dd6419e4e99a80481bf7ca77919a0c8b2efa805ada79f7a85d4142deff160e80f15a52957a5b8691eb11541a273e06272a5dc713d2a46ae7707609d1f0a357bc1956606ea048f4cc44061b6f69a9c210f2757acfc16e29a5a7be9d4f87a44eb052a7bf9646a07268985cef7bb557fda3c8d3e712a9520c53b64305a2806a51bdddfb6757e2c8a89a32f760927aca79273fcc04f097bed931cf27b162f670a5f2bbd5a0e2e1c70f103d30cb20c189795101a6bb102bc229208d48eb12e61237640f9d0de1365d89b1f8f9d9bc137b57af23470a13452256d393992b57f4b8208ee09b439914b0fef9d87aeffbe40d86a3e7b9f4131cc6d16eb0801a7de6f3a69c02bc3ba98ecc64fd0dd263295a6d39f1133fc326e162c328a0d141d5759ef35e1e511653f6d4823dc3121c4e879379dfc5f6ab443184e6f535a75b8c79c825a3137a606b5e9b5f86a37cda174d6183cfb10230a055bcd4b99982c219014e68e31d3e87f15654c99d5564ca34dce927fd56438ed6f5559e85a8c88076425d5d137107bde7ab9dc5d118b4094ee3700f643454c565c28b254c26c16f3a4b8d31e02c891395d7e68b79216846852fadebcbb7f18b5865909e7457fc8d989ec0d0c0a20b833fb78210d030a1683c9f17630cf8b71047a525c3c5f2d8d83ca1f33af440d0d30db4621d3b22a066f675be82f61c0a7f76c3a046137c2c1cfd4ce63fb8448a91067c7882dc28f78d9d269fc8f0af4648e1b8feb755cc0c674454ec6f748b7154f356000445e355545b636119429dc22b239811fcffd2b988e7ac2c9bacfaa3bd20f6f8436698d13b94f283a76499946ac273e792fd3c65deedf94a395133daf71a3ad5f4f0a1540a63a31dd987edad89627b5dfd26eea843b94adb7a2957a8e8f9327be78996fce2a7b448848761482b909c06853647128609e23b3c18baa4b375beb74769523230c8d41d9e24659748d4f3f19c2337beb7ce396e6e3e736797c208e7f926c1376832e08c64a994891e2c81b3e5c7133653e8a6e0c54108601ef3004dcff6cd637b52f71b1a7ac055c16acc9da3ec62e4036d772bb14ecbcced513dd2b08354474cee76b637316effaaccc8a5990015141a73bf6df3d88dbd378f4f32b0a05fa5c87abfbc9b82cb95949a15acd397ef0ead490383f009ddd16b3fd4870bc56ac2a57cf522d07366fec6d9f7c86703e6b35f1288a91faa10d53de99ed8e490dfaf9f295b333b5c90f6f1d87cfdfea5c1f3398002967bf7e8f3f18036fd9bc048fae6db4cc4bb301ff2fd1a7e29712d30f2795c7fd9fba801d1b37a2beb8d28b31129c37b660afd2aeb4519229360e0fc144b42174d00bb52fd98af39cd9ef187f1f394b7616bb481f24e9d27977d91ff51bdaa904d9fe5a14270b9ca4794fe7b2c853768a6550995cdd5d17e2599f6b83c9dc6d0390b4703d3eba9515806c544a979331b52f77940472552f1dc47187fd1efebaf5776e94ce22f524ed975d9b17d50b98b227afc9f9df4dcb50308a38937d26a7dfab0dc539ea3590c32e8064846051307967a1c044d583ee02aaa87f187bfe25324eb150e07f533428a948ffb745085b25199cee069b6f6d8463ea09d36e3e415bab7c6dde5fa47d88143e1fb264e9cf11be909ca0417999233ed6e79d1e29307e871a5e3dd23e412c1800a0e6c877be0173e953c6c942761bee8c98e820f230da4c73ec812058fef278412450677fe5fe0c4ee58ec50040d26e47d99dbbb4e60318ab36d6afb81091f21149ee20961f314d5013dccd30cb04f8dec00f1266772a4cf0fae59339488c59eec28e8f571e47e5d70de5cb8dfaafd7b4e840c77a29189916ae0d8192e4afb03184fd814c06803f11b625b1eb116249099000565f7aa4063735cae90f52a84f9d616f48ad9759865712225096fe6a01f4aea5bb37c3eb8d535d8e1ae9601a0adfecf3e6636a89a665a04b8c4cdd8eb9ab9a405e80ff3b62a277c27e9063988f69e4655b1a3a0a14d735c62801ff4bc1922e0986f5210e115b6eb2543fc20ae0958212f4ed7c5d85bd894aaa72bbc79c576bd6d8f10150fb15f6a7a463300465fb8792dbb5a6649015835c9fa828dedcd56057e867a94cbe8ade24a6c970198f73d7880a6f8032b71aaa66a8579aa8a3c6207184e793bfebcd6d2e1470ee84d68310d2ac491dd7d91e9eae3626627f9a69af0742b1cbee529b06e76fbe2ad39ef033077913f040d4e135d2f6530c5b89cf279fd82a51e07e9926dd304d908bb131bc5954cdeadff59f94132801f2ab47bb202a4bb6b0280df69550dce6ab7fd7563f4538ecedf3632158cfe34906248b92dd0af1a058e2f73a34c340b03975ec54c3704bf63226ea2c9c560f4ae09323c7fc628c03f9e618d9101ffbb8c42ecb25178f5ab66e89b0d1a0433542426cb25fadfe101a20ca0ed69e099edf9a65109b0eb1de34161becea1c921612e794ef6ecff5d11c1151e0fdf4e2001c303c1cfb87c540b77867dd5a2b1f9e40edaff07710f5b13aed074d15587da5ea83b3a843ade8e842e807a93e9337718a8cdd116f6c30c5dd24694bc6a0bf063518dbc0bfb9178628afd83d3829cce8b091981b788deebb601709eb0ab8e58a07e5fe6cd2be4736f85c9e319175f40dfc5288697141cfbfcbf737cfef85284c718d4b9a0a4ab08269fe95ff1bdb60ded7958333bf9606c062048609112fda61c7f8b6560f8f5e57f82198f4ae5fe5ae5212837f7c5519cfc59b385e20f7856562f230318436450f245c803d2afc60b6fa23c62279cad2c71ea2fbdd0d5fba2d955d4d4c9f5394627ba4c630ae212a557c6e5310abdc6c31de6f79bd63ac9b2279ab77fdd4d42a0f0b26252816c41ce30068f1cf4b040eba62c68ac24c0c805f604acd44738904e32d9873c4d76002ef60b2200a141986d9e992e31d9fe5389aa28ff1d8980147e66b41b47fce223f672e13f4b02016a27e30756d631b5dd09558ca210cf300985e3b92ce249670613c25af88c48c44422ec9b7476b9ec08965fc81280c7943ed19dda3d1566e9dbb4eaff028b449118d624d58513005024b1f08aa347367c7101ab1a2d8673fe3262e6d2382867daf6889a8d99f311a8b90333fddc4b53bd6a9e7baa590d8f3331f87570e39eb52af82fbc04c6a76d27bd9466279fb1d61bf03bfb411051d35dd430433bae8df2aaa4534bb5d9b01647262db8ff15aa8d31b286363045aa55ababce5030dce3ef936612d09f13fff3835c0d5a82e3317e7da5fc528eb765b628f41c3a1cdfd2df2729a1f03f8a64a63e0fee18ac5c3bc18c5f8baf0057ece3932fb4b82367e60a88dd364f7bc22b274b0235c976b30f038e55759f79753c88e3bfb108307bb981ce8b1d24c42dfe47c13164bc0d858cc72742c8417d16085ffd63114f1da929879aa09ca3d47ee98f62da4f1668ab0e76e6198b5112696895ad1eafcb1a1c6ac0156827031ba8de320246e2d136c8f5444c4e560e5460a31a70f998d85c84735f60a9574dff274805d1b809015a3a944350331ecfa554b8552335ab0dbe5adbbb4687f65c43b1b174c0f3f0bfdea11f86e89013e5553514a614920b4ee1371d7fdedebeefe9c637a9ddf201fd8333e53753e46858a892f69fb99ecbaf96f50ade2baa27e6724c884bb1dbcd720ee1a9d8186d416c3ca28556b8e367a50ddd66e9884f7d6296ac3e27ad45474f6f9345235d39dde8b1ce53976919423c4883b7cf546a0b920815a9fd40f9a5c5b504c2e2221cbdf6bc007b7457e0277fde0e26de6f84e1617faee006b3871d4a3e3b22a9ac090740cf2c7bcba3594d3045a3bd1fe10dfc82b7f89b1e62a6743c7d2adb9ad99b4be0300de2354816193dd9b311b9887f3af182db2a9f23174960eaed4c179e3237317b048e31e19692f813d58f355c2657f444b8651889e52625a10591482c48330079da35bfb723dad2e7f718ea7d712aa18f5856cd6f27c5f92b2c8adada6d4a6938f7456aebc66782d121e9102f83a06d1f4ff01e4d4df4e34f48db26ce57956906d41fe61ff21f09108cd4447c6bb8f745fcb8cc7ce69c66caa86a989c1e75adb83101d9c37ba5782c5382e899601a6d0ca1b1e6e36673d51f7a02356550bc8a596ddbc2f16d23c29597e3fa1bd40cfd7110a6b9743608c3cc09cfa32deb23e1b96c928326784f30a22445bb86d2588312fa43b6ddd922c3f354b73b6556ad7607e4818ede23beb4b826bc9a15e6c0101e3e55a366acc216b3667a390c50c0a8179b3b28024466670a1464e6b82ae61ba05483f10c20acfba3125c654ee7877a5dad4e023729a040420bc5a6a0535b5eb9580c38069a0501abed3b6538d38f8f122272c7b6f7f0227d9e8beb7431bb398080fd2712f4d7b1bd756539434e4345b1d7952353e84bb34e1af411bec4a3d92ac848d0ea10b1edba2003ccd490510e3c5a92dd6e88258d9dd81839675b0e6f73efeadfdbd56928ac018ad6dcf1c8b30003317b75af160aca2a482ddf8d373ed6e1b99daecedf22a43f7ffc575d40399006775f9cebeb06a132f357e2ab5dca9df7943fd87dc7bec3f747a2e564cb0a516681bcd010056b47bb140ba570f8a59ba1d1c27873e973c97b18eeb6d3ed7c1099a2ad939e1ca014ea34e9cdfdb23056f7a1eebf1f8e94a23cbe10ffcf6ba5382c20374a5960f2af50224d734b6a3f72f8cbb0b8bb662d6b1da6af41fc339b5cab9d444e1fd7eec4bda6c3e473d5025a4cc195ef0068eb0fc9a61a2dbb63364e0eb2debda5eceb974caab16f9b42880e26f02f088a1dfcb8df632069f1d52db350780004b4e399d4d31a814e0f31d0668327f1f5248150ba28a2f2a6b1b44766b95ad69633584a4a9511ba5a7d5ee7f300218eb96a9255539551167574f64e02e6c7d98fbdd7efaf8873ec681054863658c2e4463942b5bf0bcb8f666849060b9fc157ab7df5e40246dfd112ffd1d7ac034d752343e524e559e0895c520b42137774d32f9c367f1bad7524c2b3d15e9cb74326e3ac51e8b9d48d62c4e1ef7bace98ac856fe4030c8e7e844e348427eaf8bd2fe107d1d5447569b979410b17223f47799d477601e4427b7bc96021c51d9a25f03f110369b454ef6b324a51becad8564d3da456772ff74a06e3503d7139ad20fcf0f5aa1900df3b1e9a8e71590354c292748b8ca50088e861373c5409e75bf888e9a09c68f8710485364cd8e5402d95aeef9f5570eff3604272461fb34c853e07dcb7df515bfafde64f8adc310cf98237577052dd07057b71feb295e11065bc7a1ea419b821fb355588cb92e90e0c926217c7bb6d09dd74532ea74c7ccf5f66f9d2d14a6a1f59d2dacd2dba2d1daed7eb324394ebf5f3d77c0169380d223cd051391feceeabe8ba9cc8202fd71550416d002cea2f31bad2c700e12bc7d63312953462ead1428109adda9ae4293e52138a31e15d8651f6b6231088cb64d13f5b6f01dbdfb29896d066e90737e2ceb8c5fe2921db04b758a28b4a0d6e562e44f7423e368ea09afbd85902da0a90f3fbb194a28604d40e03031252513268898f0fce1d2bed6357daf2dc80fb7509d3a0303d6ae71e89b4d2dd42cc739dfe890d47f39ef62d056d8a54021e2879849438b329e23a8699c525a613e003b25c137bfb73bff9501d6bfd3781101b04701718e5bcc66ddeb70653a449357ce89851408cb2b55fdcc710930c9ebe49ebc3e7650cd05d0855ee1370747882a21c3a5d1fc6c382db69e9254a053fd351cd193c8fb9694c169ee7e73327801ecd6892", 0x1000}], 0x1, &(0x7f0000001640)=[@cred={{0x1c, 0x1, 0x2, {r7, r10, r12}}}, @cred={{0x1c, 0x1, 0x2, {r15, r18, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, r23}}}, @rights={{0x18, 0x1, 0x1, [r25, r28]}}, @cred={{0x1c, 0x1, 0x2, {r29, 0x0, r30}}}], 0x98, 0x40002}, 0x4008800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r31 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$uinput_user_dev(r31, &(0x7f0000000180)={'syz0\x00', {0x6, 0x5, 0xff, 0x6538}, 0x15, [0x0, 0x1, 0xffffffff, 0xffffffff, 0x9, 0x1, 0x40, 0xd, 0x3, 0x10000, 0x3, 0x9, 0x7, 0x1, 0x3, 0x8, 0x3f, 0x8, 0x8, 0x0, 0x9, 0x3f, 0xcfa, 0x8, 0x401, 0x1000, 0x1, 0x9, 0x7f, 0x0, 0x2, 0x1, 0x5, 0x2, 0x1a5c, 0x80000001, 0x81, 0xfffffffd, 0x0, 0x8000, 0x2, 0x1, 0xfff, 0x5, 0x1, 0x401, 0x7fff, 0x582, 0xd3, 0x8, 0x4, 0xffff0000, 0x2, 0xfffffffd, 0xfffff6bb, 0x6, 0x24, 0x28, 0x80000001, 0x2, 0x5, 0x1540, 0xff, 0xfff], [0x8, 0x6, 0x7, 0x7ff, 0x8001, 0xffffffff, 0x2, 0x5, 0x9, 0x7, 0x2, 0x10000, 0x9, 0x8, 0x0, 0x61, 0x8, 0x2, 0x76, 0x6, 0x20, 0x6, 0x9, 0x200, 0xad40, 0xd1ff, 0x20, 0x6, 0x6, 0x1, 0x6207, 0x6f5, 0x8000, 0x3, 0x7, 0x2, 0xffffffff, 0x2, 0x0, 0x7, 0x75, 0x0, 0x3f, 0x9, 0xffffffff, 0x5, 0x7, 0x134, 0x7fff, 0x7, 0x6, 0x9, 0xad72e6d, 0xfffeffff, 0x2, 0x3f, 0x3, 0x2, 0x1a, 0x3, 0xbb, 0x9cf, 0x80000000, 0x1], [0x3, 0x400, 0x6, 0x5, 0x67b56b4b, 0xfff, 0xc822, 0x8, 0x7, 0x5, 0xfffffff8, 0x6, 0x1890, 0xc0, 0x6, 0x3ff, 0x434c, 0xa620, 0x8, 0x0, 0xf05c, 0x8001, 0x4, 0x1, 0x1, 0x7, 0x7fff, 0x4, 0x200, 0x8000, 0x6, 0x5, 0xb8, 0x7, 0x6, 0x1, 0xfffffffe, 0x1, 0x8, 0x100, 0x8, 0x40, 0x5, 0x34d500, 0x2, 0x8, 0x100, 0x1, 0x4, 0x4, 0x3a, 0x4, 0x32, 0x10000, 0x80, 0x2, 0x8, 0x81, 0x5, 0x10001, 0x100, 0x7fffffff, 0x9, 0x7802], [0x22d, 0x1, 0x9, 0xdd, 0x0, 0x8000, 0x8, 0x101, 0x3ff, 0x600000, 0x1, 0x3f, 0x7, 0x100, 0x7fffffff, 0x2, 0x5, 0xff, 0xfffffffa, 0x9, 0x4, 0x9, 0x8, 0x3, 0xd83a, 0x2, 0x6a57, 0x0, 0x101, 0x1, 0x9, 0x50000, 0x40000000, 0xffff, 0x8, 0x7fffffff, 0x0, 0x8, 0x0, 0x2, 0x7, 0x8, 0x2, 0xb64, 0x3, 0x9, 0x4, 0x1, 0x4b, 0x1, 0x1000, 0x100, 0x1, 0x101, 0x2, 0x3f, 0x5, 0x1, 0xfffffc01, 0x6, 0x2, 0xffff8000, 0x88, 0x6]}, 0x45c) sendfile(r1, r31, 0x0, 0x80001d00c0d0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x187) 20:23:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 529.500313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 529.526363] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000026c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090f000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dfffffffffffff00000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 529.649139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0928000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 529.733813] device macvtap77 entered promiscuous mode 20:23:32 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074c00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 529.851841] device macvtap379 entered promiscuous mode [ 529.862910] validate_nla: 32 callbacks suppressed [ 529.862921] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 529.967116] device macvtap407 entered promiscuous mode 20:23:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 529.992078] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 530.067480] device macvtap380 entered promiscuous mode [ 530.073076] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 530.153582] device macvtap78 entered promiscuous mode 20:23:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 530.187901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 530.252170] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:32 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x3fffffffffffffe}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f00000008c0)=ANY=[@ANYRES64=0x0, @ANYRES16=r0, @ANYRES64=r3, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, 0x0, 0x0) ftruncate(r11, 0x200004) sendfile(r8, r11, 0x0, 0x80001d00c0d0) kcmp(0x0, r10, 0x0, r8, r9) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = socket$inet6_sctp(0xa, 0x801, 0x84) r14 = getpid() sched_setscheduler(r14, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r13, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, 0x0, 0x0) ftruncate(r15, 0x200004) sendfile(r12, r15, 0x0, 0x80001d00c0d0) kcmp(0x0, r14, 0x0, r12, r13) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) r17 = socket$inet6_sctp(0xa, 0x801, 0x84) r18 = getpid() sched_setscheduler(r18, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r17, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r17, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r19 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, 0x0, 0x0) ftruncate(r19, 0x200004) sendfile(r16, r19, 0x0, 0x80001d00c0d0) kcmp(0x0, r18, 0x0, r16, r17) r20 = socket$inet6(0xa, 0x400000000001, 0x0) close(r20) r21 = socket$inet6_sctp(0xa, 0x801, 0x84) r22 = getpid() sched_setscheduler(r22, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r21, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r21, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r23 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r20, 0x84, 0xd, 0x0, 0x0) ftruncate(r23, 0x200004) sendfile(r20, r23, 0x0, 0x80001d00c0d0) kcmp(0x0, r22, 0x0, r20, r21) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYPTR, @ANYRES64=r12, @ANYBLOB="c9c7c20ce29b3ba7c6ae74338172bba2c724d8a144dd183c28a2fc8ae5efcb476c954f9be8ffa9ed543e057ec64d77a2f040638aac500284dcc75e67ee1f97aff50fbd7cad0b78b8eae4c4fa27179892d5a8c2521ba92fe27247744b65b3b3f75f70bf8ade3bb4e4df82de26640123ced3554c5ba1fa0e3988e1a0fa4a481756b6ffdfec2f62b7a434f9f4308843cb33f67a2fb4e2b4", @ANYPTR, @ANYRESDEC=r18, @ANYPTR64, @ANYRESHEX, @ANYBLOB="d8cf19da36c89c8e794d8436f2ad48f799fe465d4e13a94b48dea2cf41bc4ce60c8096f03a0b9e67634dbfb582c887f5214a1b02a8a13a50828de206e4aaab9228997cd0f80271af79804ce580867535d0c92b787c34f3f2bb4f5369294239f0cef65bd9c186905d8ab4549db9b28ab218f704f2bf0135ea4006be495ad4b0955df4", @ANYPTR], @ANYRES64=0x0], @ANYRES32=0x0, @ANYBLOB="000000000000000508001b07000000000800040000000000"], 0x3}}, 0x20000000) [ 530.322202] device macvtap408 entered promiscuous mode [ 530.338572] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 530.417784] device macvtap381 entered promiscuous mode 20:23:33 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000000)={0x3, 0x1, [0xf0a1, 0x8, 0x7f, 0x3f, 0xdd, 0x3, 0xfffffffa, 0xed]}) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076000"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0948000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 530.644895] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 530.741043] device macvtap79 entered promiscuous mode 20:23:33 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede1200000000f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 530.774605] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 530.796797] device macvtap382 entered promiscuous mode [ 530.802423] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 530.864069] audit: type=1804 audit(1578601413.296:345): pid=24896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/618/bus" dev="sda1" ino=16601 res=1 [ 530.908290] device macvtap409 entered promiscuous mode [ 530.913904] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 530.959800] device macvtap80 entered promiscuous mode [ 530.985490] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 530.996704] audit: type=1804 audit(1578601413.386:346): pid=24904 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/618/bus" dev="sda1" ino=16601 res=1 20:23:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076c00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c094c000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:33 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r3, r6, 0x0, 0x80001d00c0d0) kcmp(0x0, r5, 0x0, r3, r4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000000)={{0x2, 0x0, @reserved="3342d921eee75ce694ef66b781eb0ed90258f844cb4d6391f3e0ccb99ca2c36d"}}) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r7, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 531.036424] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 531.053785] device macvtap383 entered promiscuous mode 20:23:33 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000200)}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, 0x0, 0x0) ftruncate(r10, 0x200004) sendfile(r7, r10, 0x0, 0x80001d00c0d0) kcmp(0x0, r9, 0x0, r7, r8) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYRES16=r0, @ANYBLOB="5876991522ab8db96c699f89a2fb186eb4548ea843a6282fb46dc7dfa4218833741150e89e92edc8ea6209634e249f4d0837db39e2826ff1607f0f50311865e89d7c321388addaf33335d979397447051648c335388794f0b0696a5870079922a73cec8211e22ed58bdbe4bccda777293e1f7a57be2c5ccb7a9d6a40d2a9ce"], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r11 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r11, r11) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000f0ff000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 531.257921] device macvtap81 entered promiscuous mode 20:23:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0960000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 531.346317] device macvtap410 entered promiscuous mode [ 531.353857] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e6f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 531.458685] device macvtap384 entered promiscuous mode 20:23:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0968000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 531.496940] audit: type=1804 audit(1578601413.926:347): pid=24917 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/619/bus" dev="sda1" ino=16636 res=1 [ 531.675498] device macvtap82 entered promiscuous mode [ 531.703582] device macvtap411 entered promiscuous mode [ 531.748670] device macvtap385 entered promiscuous mode 20:23:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c096c000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000000e7000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="9521bdf8d86bcfdfd8a932080d58845b7b315d744504f91057850704c3009702bde03863424d7a", 0x27}, {&(0x7f0000000400)="6385627258066415186bd95f360823062690f130d778321b0c51e90be0fb8625b53af185e204ecbdd538dab4f5646bfd", 0x30}, {&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000000440)="8e14d9bb1609cab3f5105d49092833f41d9477bf5416d66152c0fb93f777aab61f726a11f7e0dfd88a9ec5670373a38a2e7c2d8e05257aca5e085f59d01f267a1a2b5ec735239af41e465db4ef46", 0x4e}], 0x4}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871055d6c882d0316ede12e8bf0e36f56f164af1546a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64168991db2800000000f44911b19f2662f3914abdab2cf84a"], 0x1}}, 0x0) close(r0) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESOCT], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x24008091}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 531.940213] device macvtap83 entered promiscuous mode [ 531.958244] audit: type=1804 audit(1578601414.396:348): pid=24943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/619/bus" dev="sda1" ino=16636 res=1 [ 532.006386] device macvtap412 entered promiscuous mode 20:23:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0974000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:34 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) fchdir(r3) close(r1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r4, r7, 0x0, 0x80001d00c0d0) kcmp(0x0, r6, 0x0, r4, r5) ftruncate(r4, 0x4) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r9, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:23:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07f000"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 532.224884] device macvtap386 entered promiscuous mode [ 532.297049] device macvtap413 entered promiscuous mode 20:23:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:34 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xb}, 0x3010, 0x0, 0x0, 0x8}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 532.411037] audit: type=1804 audit(1578601414.846:349): pid=24974 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/620/bus" dev="sda1" ino=16645 res=1 [ 532.453956] device macvtap84 entered promiscuous mode 20:23:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c097a000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d079e01000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 532.562867] device macvtap414 entered promiscuous mode [ 532.608853] device macvtap387 entered promiscuous mode 20:23:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff939615b14e2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, [@IFLA_IF_NETNSID={0x8, 0x2e, 0x2}, @IFLA_PHYS_PORT_ID={0xa, 0x22, "a19ba1bdc447"}]}, 0x34}}, 0x0) 20:23:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 532.672591] device macvtap85 entered promiscuous mode 20:23:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09f0000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07a001000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 532.819872] device macvtap415 entered promiscuous mode [ 532.855800] device macvtap388 entered promiscuous mode [ 532.900677] device macvtap86 entered promiscuous mode [ 532.924715] nla_parse: 7 callbacks suppressed [ 532.924726] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07aa01000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09a0010000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:35 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:35 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b280374007242f20a00b5f9a7715919be87aea1847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESOCT=r2], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="30000000100001080000000000f3ff0000000000ff666794e504aa5088cf10331a34509f77541a1baed648927cfa02dc804afc871a13fc3afb4c0129b61f6da2e8f7c02ab9c9f5192694dc9962de13c4046dd186ac3cbaf3b54d45318752ff5f8396d3a4787034ff418271fbc81b42b88e49705e65cf6e0e13e06847fabe88b1a99cc2dd41f3ce98c4b027e52dc6", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 533.237035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 533.269438] device macvtap87 entered promiscuous mode 20:23:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07f401000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 533.306208] device macvtap416 entered promiscuous mode 20:23:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000007400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 533.382770] device macvtap389 entered promiscuous mode [ 533.444657] device macvtap88 entered promiscuous mode 20:23:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0941020000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 533.503016] audit: type=1804 audit(1578601415.936:350): pid=25033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/621/bus" dev="sda1" ino=16644 res=1 20:23:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07fa01000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 533.677113] device macvtap417 entered promiscuous mode 20:23:36 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)=0xfffffcc5) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 533.730702] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 533.763822] audit: type=1804 audit(1578601416.196:351): pid=25036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/621/bus" dev="sda1" ino=16644 res=1 [ 533.799747] device macvtap390 entered promiscuous mode 20:23:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900030000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 533.851861] device macvtap418 entered promiscuous mode 20:23:36 executing program 3: ftruncate(0xffffffffffffffff, 0x200004) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r0, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 533.929102] device macvtap89 entered promiscuous mode 20:23:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 533.990223] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070c02000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 534.084638] device macvtap391 entered promiscuous mode 20:23:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900050000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 534.149666] device macvtap419 entered promiscuous mode [ 534.239260] device macvtap90 entered promiscuous mode 20:23:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:36 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:36 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x6, 0x5, 0x0, 'queue0\x00', 0x11}) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075602000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 534.338941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070003000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 534.440022] device macvtap91 entered promiscuous mode [ 534.454428] kauditd_printk_skb: 2 callbacks suppressed [ 534.454447] audit: type=1804 audit(1578601416.886:354): pid=25082 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/623/bus" dev="sda1" ino=16654 res=1 20:23:36 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0200000000e2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316e33ccf92781d0a0de12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db2800000000000000"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYRES32=r4], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 534.501713] device macvtap392 entered promiscuous mode 20:23:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900060000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 534.549566] device macvtap420 entered promiscuous mode [ 534.568898] audit: type=1804 audit(1578601416.976:355): pid=25090 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/623/bus" dev="sda1" ino=16654 res=1 20:23:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 534.656783] device macvtap92 entered promiscuous mode 20:23:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 534.690244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070005000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:37 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) accept(r2, &(0x7f00000000c0)=@sco, &(0x7f0000000180)=0x80) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r9, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x80000}) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x801, 0x84) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, 0x0, 0x0) ftruncate(r13, 0x200004) sendfile(r10, r13, 0x0, 0x80001d00c0d0) kcmp(0x0, r12, 0x0, r10, r11) ftruncate(r11, 0x9) sendfile(r4, r7, 0x0, 0x80001d00c0d0) kcmp(0x0, r6, 0x0, r4, r5) r14 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x100) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) r16 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="410400000d0928375aadbf83efd119a59fc335785a4283cd7c1aceb516065e652343794c529b12537a538b9b60a1157b30796450903465c1004431a54076262352b3c013313ac5ca4a0d9082a67fd9f16a2ce9939d8731339e0274c256845bab993317e0141505b4191fc3888cfbeac77d289759d9adfc120933dfca2b9f5e30832e5ab6e8aa42f21f729d90df6601e6c6c32b3f2e39", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r15, 0x84, 0x6, &(0x7f0000001540)={r17, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000001600)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r14, 0x84, 0x72, &(0x7f00000001c0)={r17, 0x5314, 0x10}, &(0x7f0000000480)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r17, 0x3}, 0x8) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140), 0x32, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000000)={{0x16462d9cb82762e, 0x0, @reserved="509a571c7c2a5972a8d875a00819f4ea169425ae620bce9d0b0f6d68bba79113"}}) [ 534.862709] device macvtap393 entered promiscuous mode 20:23:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900070000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 534.894476] validate_nla: 33 callbacks suppressed [ 534.894485] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 535.015054] audit: type=1804 audit(1578601417.446:356): pid=25114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 20:23:37 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000012, &(0x7f0000d06000)=0xfffffffe, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="020000005fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28d09b3f1b7366a4bb35a28a121cf76c537d4e37a35ee997aaec00ed8c341a8a7ce5a3e0bd79aa7e84329c0260d0c67b9fbb8ca9ef38eb4d83be628e3a65"], 0x1}}, 0x0) close(r2) shutdown(r4, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r5, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r6, @ANYRESHEX=r2, @ANYRESDEC=r7, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r5, @ANYRESHEX=r5, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r5) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r9, r9) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 535.113277] device macvtap421 entered promiscuous mode [ 535.119898] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 535.142640] device macvtap93 entered promiscuous mode 20:23:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07a105000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 535.147551] audit: type=1804 audit(1578601417.526:357): pid=25114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 [ 535.185708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 535.275768] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 535.281927] audit: type=1804 audit(1578601417.536:358): pid=25114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 [ 535.354298] audit: type=1804 audit(1578601417.786:359): pid=25124 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 [ 535.367020] device macvtap394 entered promiscuous mode [ 535.465106] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 535.541637] device macvtap422 entered promiscuous mode 20:23:38 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6b8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000000000002000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 535.584801] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 535.627692] audit: type=1804 audit(1578601418.066:360): pid=25114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 20:23:38 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @loopback}], 0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 535.683942] audit: type=1804 audit(1578601418.066:361): pid=25114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 [ 535.719034] device macvtap94 entered promiscuous mode 20:23:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09000f0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 535.732555] audit: type=1804 audit(1578601418.066:362): pid=25114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 [ 535.767254] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070006000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 535.850511] device macvtap395 entered promiscuous mode [ 535.857618] audit: type=1804 audit(1578601418.076:363): pid=25131 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/624/bus" dev="sda1" ino=16667 res=1 20:23:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 536.033574] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 536.135834] device macvtap95 entered promiscuous mode [ 536.147660] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:38 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070007000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 536.210973] device macvtap423 entered promiscuous mode [ 536.220304] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 536.243689] device macvtap396 entered promiscuous mode [ 536.256770] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900200000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000007a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 536.342945] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:38 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 536.428611] device macvtap96 entered promiscuous mode 20:23:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070009000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 536.453271] device macvtap397 entered promiscuous mode [ 536.481649] device macvtap424 entered promiscuous mode [ 536.536762] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 536.593762] device macvtap97 entered promiscuous mode 20:23:39 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) bind$rose(r5, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x3, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null]}, 0x40) 20:23:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900280000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07000a000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:39 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 536.990218] device macvtap398 entered promiscuous mode [ 537.005484] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 537.026775] device macvtap98 entered promiscuous mode 20:23:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 537.066977] device macvtap425 entered promiscuous mode 20:23:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07000c000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09003f0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:39 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) read$char_usb(r4, &(0x7f00000000c0)=""/70, 0x46) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000040)={0x0, 0x8001, 0x7506, 0x27, 0x9, 0x7f}) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r6, 0x117, 0x5, 0x0, 0x5) [ 537.320642] device macvtap399 entered promiscuous mode [ 537.362298] device macvtap99 entered promiscuous mode 20:23:39 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0xbf, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x40001ab, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07020c000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 537.445256] device macvtap426 entered promiscuous mode 20:23:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900400000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 537.565783] device macvtap100 entered promiscuous mode 20:23:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07000e000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 537.630588] device macvtap427 entered promiscuous mode [ 537.699637] device macvtap400 entered promiscuous mode 20:23:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 537.789179] device macvtap101 entered promiscuous mode 20:23:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0902410000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07700e000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:40 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @timestamp], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 538.011528] device macvtap428 entered promiscuous mode [ 538.050053] device macvtap401 entered promiscuous mode [ 538.078870] nla_parse: 2 callbacks suppressed [ 538.078880] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 538.141455] device macvtap102 entered promiscuous mode 20:23:40 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0xa30008, 0x20, 0x40, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x980923, 0x703, [], @string=&(0x7f0000000040)}}) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000180)={0x0, 0xe7b2, 0x80000000}) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r8, 0x54a3) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) finit_module(r6, &(0x7f0000000000)='\x00', 0x3) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070012000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900480000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 538.344395] device macvtap429 entered promiscuous mode [ 538.379965] device macvtap103 entered promiscuous mode 20:23:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e7f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 538.465186] device macvtap402 entered promiscuous mode 20:23:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07001f000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:40 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0200000000008ff93961a05f088f4be2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r0) shutdown(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x8000000000107100, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) [ 538.500267] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09004c0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 538.543341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:41 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 538.702437] device macvtap430 entered promiscuous mode [ 538.716815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 538.752121] device macvtap104 entered promiscuous mode [ 538.808565] device macvtap403 entered promiscuous mode [ 538.935052] device macvtap431 entered promiscuous mode 20:23:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900600000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070020000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:41 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="a0b44885cb465922ce463f34b34b0008001b00000000370800040006000000"], 0x30}}, 0x0) 20:23:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000008100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:41 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000000)={0x80000010}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 539.182856] device macvtap432 entered promiscuous mode [ 539.230371] device macvtap404 entered promiscuous mode 20:23:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f0f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 539.281614] device macvtap105 entered promiscuous mode 20:23:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 539.333876] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 539.366443] device macvtap405 entered promiscuous mode 20:23:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07003f000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900680000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 539.521352] device macvtap433 entered promiscuous mode 20:23:42 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b880374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdfec52f68e1dc6591ed99038eeb64128991db28394d4770a092e5ab3c234e805a45e4e4fc0c5daf91504299607c0b2054dec8852f4e1034d5"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r5, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x2) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r6, @ANYRESHEX=r2, @ANYRESDEC=r7, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r5, @ANYRESHEX=r5, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r8]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r5) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r9, r9) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff13, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000000800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000008001b00000000000500040500000000"], 0x30}}, 0x0) 20:23:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000001000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 539.663936] device macvtap406 entered promiscuous mode [ 539.699774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070040000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09006c0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:42 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x81, 0x9, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000003c0), 0x8}, 0x3010, 0x7fff, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r3, r6, 0x0, 0x80001d00c0d0) kcmp(0x0, r5, 0x0, r3, r4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESDEC=r2, @ANYRESOCT=r4]], 0x1}}, 0x80040) close(r2) shutdown(r2, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r7, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r7, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r9, 0x84, 0x16, 0x0, &(0x7f0000000340)) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r8, @ANYRESHEX=r2, @ANYRESDEC=r9, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r7, @ANYRESHEX=r7, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r10]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r7) r11 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r11, r11) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="30000094", @ANYRES32=0x0, @ANYBLOB="00005e000074860d300832dd0500e6b2822bf514d54363c0306e4658db0400c23af6ab7c0a33da9d1f96"], 0x30}}, 0x0) [ 539.840774] device macvtap434 entered promiscuous mode [ 539.853239] kauditd_printk_skb: 15 callbacks suppressed [ 539.853256] audit: type=1804 audit(1578601422.286:379): pid=25338 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/629/bus" dev="sda1" ino=16681 res=1 20:23:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 539.908679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 539.922913] validate_nla: 30 callbacks suppressed [ 539.922924] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:42 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) sendto$rxrpc(r3, &(0x7f0000000040)="89ae912aaa9214a5ed86b25118d00eff3b4fb00011ea382f876359ce19bc02e8915ce59da617f68a564253ae", 0x2c, 0x4000000, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @multicast2}}, 0x24) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) r7 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x100) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, &(0x7f0000001540)={r10, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000001600)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x5314, 0x10}, &(0x7f0000000480)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000180)={r10, @in={{0x2, 0x4e24, @multicast2}}, [0x1800000000, 0x0, 0xffffffff, 0x6, 0x3ff, 0x7, 0x6, 0x6, 0x7, 0x7, 0x9, 0x8, 0x9, 0x94, 0x2]}, &(0x7f0000000100)=0x100) [ 540.018782] device macvtap407 entered promiscuous mode [ 540.033882] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:42 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x1b5) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 540.058930] device macvtap106 entered promiscuous mode [ 540.076712] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900740000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070048000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 540.113195] audit: type=1804 audit(1578601422.546:380): pid=25356 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/630/bus" dev="sda1" ino=16679 res=1 [ 540.259474] device macvtap435 entered promiscuous mode [ 540.264978] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 540.273328] audit: type=1804 audit(1578601422.566:381): pid=25356 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/630/bus" dev="sda1" ino=16679 res=1 [ 540.363815] device macvtap408 entered promiscuous mode [ 540.373254] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000001200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:42 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000004}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 540.474765] device macvtap107 entered promiscuous mode [ 540.504547] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07004a000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 540.582795] device macvtap436 entered promiscuous mode [ 540.589999] audit: type=1804 audit(1578601423.026:382): pid=25360 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/630/bus" dev="sda1" ino=16679 res=1 [ 540.633729] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 540.677743] device macvtap409 entered promiscuous mode [ 540.684221] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 540.686890] audit: type=1804 audit(1578601423.066:383): pid=25376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/630/bus" dev="sda1" ino=16679 res=1 [ 540.723240] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09007a0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:43 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0xd, 0x84) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x3, 0x1}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 540.795556] device macvtap108 entered promiscuous mode [ 540.795740] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:43 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x84, &(0x7f0000000880)=[{&(0x7f0000000600)="f157c4efaa8a453ecf48318e242d925bff73d3fa981a6dd98c92816e9d849ae53c3bf975f259dbb5f7c8b42e935d5024e4daabcaa10b43d97f8f299fb4256416afc1f5aba68967962d2f36d1385d687fdbb10bb30210381b78fb21c45ffcaff22c8f920ccb9ccdda72cca29cab46f504e71cfacef6e713c02f46802e9f16602933f77ef420a454e77e32ff36e5ff1001f3675f121b3f9a4ccafcb70b9e1b4af92960086b59b0e2e799d7d9b5169d9a65a4ef235c00cf64e31c05e9c95bec5ca97dfd42e050a3b85aea2b254ccce7918905a23e8d6d466fc62204966a614f7a687c59cf"}, {&(0x7f0000000380)="5d6c66077bbf97bf43e6dd81502d0b6de50690c17ccba1a80a2837b8a505a55c698c0b9b024402708a640832029f0f234f2e3fe4a56162f199ffbf970769dfdb97034e23cc6c22ed2de9f5f5b670162157b9a2bbf7199cc010b40f0dde24c09ca3458a8c5de08f2a8b752f680a59ad7e8a2d61ddb2fb16b30657580b64ff5322680290679eb2abe11f1817b46a"}, {&(0x7f0000000700)="4632a0aa6ddf6594ee2e9b0a5e80f16d45db19cdd07affb62b2d63c0f08d8619e2e4d793ddb01aca24c370980b0d8fa8c9806b17505cbe096ee72fd513e333f70b288703d8d9365f51ddff89cca467cd1ea2b06d"}, {&(0x7f0000000780)="814136f3adbd59006e09adcd0184e583b88df0fa2c55f2a33aaf1fc323e1d247ebe501dd9fd55cd94f0c6d17dfee8675c6be2b4b82b3ca24ac0061c7c203bd0bb5e58bc2a7b189375c89712519f7374c6beb771e759d8481012c6faba34cd9f0d8b909cd192bf6ae54723f"}, {&(0x7f0000000800)="3b290524d603ed76538d9ac835a34a28fd513d258ff98e68467c9996b04132cdc845ec0d7ccdf357b5e3f2bd5a76936cd629a80f05cb2c05fd19c0fbf49512d53b3645c65b53102a5c3728093dfb55d8003db5b9d20947d4008b3547c46a426d859f64cc"}], 0xffffffffffffef2}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07004c000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 540.986249] device macvtap437 entered promiscuous mode [ 540.998062] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 541.020158] audit: type=1804 audit(1578601423.456:384): pid=25400 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/631/bus" dev="sda1" ino=16682 res=1 20:23:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 541.102254] device macvtap410 entered promiscuous mode [ 541.119053] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:43 executing program 3: r0 = gettid() prlimit64(r0, 0xf, &(0x7f0000000000)={0xdf, 0x7fffffff}, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r2, 0xa9}], 0x368, 0x0, 0x0, 0x0) [ 541.193468] audit: type=1804 audit(1578601423.516:385): pid=25404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/631/bus" dev="sda1" ino=16682 res=1 [ 541.275436] device macvtap109 entered promiscuous mode 20:23:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 541.302289] audit: type=1804 audit(1578601423.736:386): pid=25408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/632/bus" dev="sda1" ino=16685 res=1 20:23:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070256000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 541.417036] device macvtap438 entered promiscuous mode [ 541.436167] audit: type=1804 audit(1578601423.866:387): pid=25408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/632/bus" dev="sda1" ino=16685 res=1 20:23:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900810000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 541.463891] audit: type=1800 audit(1578601423.866:388): pid=25411 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16685 res=0 20:23:43 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x7, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a000090242fa0a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db282541b82a9bcdd7e0d395055551c9cdf674a297c458379f6a7e47c3a6ada318a6db181b07876bd1949696957405f2d6fc67105db5a454f3c9c4afa61f67772a5029312c4e42cf1838a5e0c7f903b1a085e6caf2dae4419be84b"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}, {{&(0x7f0000000380)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x5, @empty, 0x6}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000600)="f5299f831f2c6338fafa58c38c7b8d4ee8319b4fb7cbaa752d71a1ddfd555588e0cc386ae594b981585a3e71313e867a1b7b2f80ed92e50f62e50b2f0dbc37a644f1950424102c621a6fdeb49988901c67b08b5faa675e62890488022cf0b7739c4b66c31fddf5f1195d020acaf1c84f73420dad296b4036639dd8c2830c", 0x7e}, {&(0x7f0000000680)="245ffbfa6ceb0258541b81c172a159f72016caa65c655c489e940da2e525a24b4376d038d05015afd09266d93320fd3e1cf4cec8c3a8cf9dd396e4d8b0c34a18617ff828632ebc", 0x47}, {&(0x7f0000000700)="417e8ee1acf8f36e75c14d69c8e0e86b949d2f7ad150c823fcaf2bd9fb42fab31815a11b11eec5097bc914daa30bd97b9f2f86cb54aa1a3f87917986134fe09f2f33c6337228630905170e5bff43587a4931d157a61cb9ab9b05e2f90e351dfe27f7e0392c1cbe7c523409572a1a6368ce19fbbff2926cd8ed8a5b7914e475c9", 0x80}, {&(0x7f0000000400)="e5bea91ccacc6475ed2bece7134681b72b418a1751f6e0eb9e", 0x19}, {&(0x7f0000000780)="5d8970369e85752030e97badcef01d6f4fa6447a108c72551455990f6c1ed539fab2119079d7b835abd5c2b89837840b1e3f2ec1d4681bfbdd217f8be82804fa27cc692c574bbc", 0x47}, {&(0x7f0000000800)="3c24476f8a4d55136805a2cca08af5e5a781cd76e9c9c945394bf06ceb7c9ca9fd4c3932aac75d0edc46c484f721f0c0b3e6dd6257482fe72d34e0bb031e9068e9bda8a7ee9aaf970bd3fb92a45a9c3324d919a6cf11d695602b7b6067805675cc58d4da23793dd6583d032fc7016447bad1e165461859067e7895c1e9893f4b00d1bde867a1b41516a7f14d3a81d48ad57f0acba666718697dd3e3b7f6d1d315b86f6efd6c7544940f897dbe849a0eaf8c8aee82544aaa0c10f061472256708c28a60", 0xc3}, {&(0x7f0000000900)="255bdfc5bf7e51ad8b167e352e264a5ce080e5cbf52c07a2d602e77e1ece04e168076e4836bec94e3acfe5ee1bb2a663bfb7c7bede3b18a75a8789deee722c8dfc54bc21a0f39622069aa1311561cc8d571f053154160eae381f50e8b83013c18b4c51f92537904a779716e84f9286c5481f807da0bca50deb971c18432601ec55d2cd53d62cff7aeec93939d25877800189ca2cd03aae992864f6cda9b77965f6af46237693c2e7787ed8fb1425e4a4ba", 0xb1}], 0x7, &(0x7f0000000580)}}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r8 = dup2(r7, r7) accept$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x1, 0x1, 0x9) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r12}]]}}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', r12}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x9, 0x4}, 0x0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r13}, 0x78) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000bc0)=@bridge_dellink={0x1b8, 0x11, 0x400, 0x70bd25, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x1504}, [@IFLA_XDP={0x88, 0x2b, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x3fc3900368e31e05}, @IFLA_XDP_FD={0x7c, 0x1, {0x18, 0x5, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffb727}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @jmp={0x5, 0x0, 0xe802dd3e0cec5417, 0xd, 0x0, 0xfffffffffffffff8, 0xc15ca436b541a907}]}, &(0x7f0000000a80)='syzkaller\x00', 0x100, 0x0, 0x0, 0x41100, 0xc, [], r12, 0x16ed7ad6948f3439, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0x4, 0x94c, 0x100}, 0x10, r13, r8}}]}, @IFLA_GROUP={0x8}, @IFLA_PORT_SELF={0x3c, 0x19, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "afbc44934b8f96d5a43e75ebb89546b4"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "c8ec66663ba18e9dcfad4d5c45ef3dba"}]}, @IFLA_WEIGHT={0x8, 0xf, 0xe42}, @IFLA_IFALIAS={0x14, 0x14, 'veth1_virt_wifi\x00'}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x53f5}, @IFLA_VFINFO_LIST={0x98, 0x16, [{0x94, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x3, 0x80000000}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4}}, @IFLA_VF_TRUST={0xc, 0x9, {0x200, 0x5}}, @IFLA_VF_VLAN_LIST={0x2c, 0xc, [{0x14, 0x1, {0x4, 0x222, 0x0, 0x8100}}, {0x14, 0x1, {0x2, 0x9a2, 0x7fff, 0x8100}}]}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9, 0x1}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffff, 0x3ff}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, [{0x14, 0x1, {0x0, 0x34c, 0x1, 0x8100}}]}, @IFLA_VF_RATE={0x10, 0x6, {0x1, 0x9296, 0xffffffff}}]}]}, @IFLA_IF_NETNSID={0x8, 0x2e, 0x2}, @IFLA_OPERSTATE={0x5, 0x10, 0x7f}]}, 0x1b8}}, 0x0) [ 541.514182] device macvtap411 entered promiscuous mode 20:23:44 executing program 3: r0 = msgget(0x3, 0x88) msgrcv(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*y\x00'/4104], 0x1008, 0x0, 0x1800) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$VT_DISALLOCATE(r2, 0x5608) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x200004) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000000)={0xffff0303, 0xbfe, &(0x7f00000011c0)="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", &(0x7f00000021c0)="57a3e46f5abd44786897c62da687584312348829a8029d52c3ae99805d64298f3c4a10958cd91a969bab4c0a8327a8c1036db167ff0de942de0fa1ddb9f4f6b75720028354a10902d614ffcf87403ee60d112edb9d8b0abe552085f925ed536a3b7b043948c3bfb9fbca0a6162750820e248e66531e3ae2420a6b2205cc5ce73debec869ab3e93365a0c8fb840cd5ca38900b0818821ab65e843cceab6d93e348b8b4892d0a35a78e7a68764b6b13adea844701090ba0a03", 0x1000, 0xb8}) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) setsockopt$CAN_RAW_ERR_FILTER(r7, 0x65, 0x2, &(0x7f0000000040), 0x4) sendfile(r3, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 541.569870] device macvtap439 entered promiscuous mode 20:23:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 541.615594] device macvtap110 entered promiscuous mode 20:23:44 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 541.651206] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076558000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 541.805218] device macvtap412 entered promiscuous mode 20:23:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900f00000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 541.858022] device macvtap440 entered promiscuous mode [ 541.890041] device macvtap111 entered promiscuous mode 20:23:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900400300000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070060000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 542.158133] device macvtap413 entered promiscuous mode 20:23:44 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007cddabe880b5f9a7715919be87aeaa6f8aa6ede12e88585e61a89f4695c94bf0e36f50300000000000000d2d3bdcac52f68e1dc6591ed99038eeb64128991db0dfa47755a29c325fd2d2ee9bc2f5c2c7b52ca240844cfe1d47aff8b80317fc8c7621fac66971d4075d20b824d0a4ca729a301e9b84e3dddb36474f931fa3e016ff9e3dd91162e366e65c8b0fefdcad608ac0c49a42c6455e0da315f25fded54626bc985d272d9fc257232c561536220b2cbf5f17c4fac68af33ae6c50f1b7f57d0900"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30ecffff0f00010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) 20:23:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 542.202422] device macvtap112 entered promiscuous mode [ 542.394439] device macvtap441 entered promiscuous mode 20:23:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900034000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075865000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:45 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) close(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup2(r1, r0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {0xffffffffffffffff, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:45 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x8, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 542.670585] device macvtap442 entered promiscuous mode [ 542.722758] device macvtap414 entered promiscuous mode 20:23:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 542.768828] device macvtap113 entered promiscuous mode 20:23:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09a0008000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070068000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 542.931916] device macvtap443 entered promiscuous mode [ 542.990853] device macvtap415 entered promiscuous mode 20:23:45 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x1880) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 543.101957] device macvtap114 entered promiscuous mode 20:23:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07006c000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09fffff000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 543.247069] device macvtap115 entered promiscuous mode [ 543.309454] device macvtap416 entered promiscuous mode 20:23:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070e70000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 543.343121] device macvtap444 entered promiscuous mode [ 543.373759] nla_parse: 4 callbacks suppressed [ 543.373770] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 543.481238] device macvtap116 entered promiscuous mode 20:23:46 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000000)=0x1f) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000001000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:46 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x800) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f00000003c0)=0x2, 0xfffffffffffffd72) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r5, @ANYRESHEX=r2, @ANYRESDEC=r6, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r7]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r8, r8) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070074000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 543.672708] device macvtap417 entered promiscuous mode 20:23:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 543.792024] device macvtap445 entered promiscuous mode 20:23:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x40, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x21830, 0x0, 0x0, 0x9}, 0x0, 0xefffbfffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaf2dd7b72851847871015d6c882d0316ede120b4fbf0e36f56f6a85f565c55a00d2d3bdcaa41bef9fd99962c52f68e1dc6591ed99038eeb64128991db"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f547be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800001b000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 543.859481] device macvtap117 entered promiscuous mode [ 543.872326] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 543.926922] device macvtap418 entered promiscuous mode 20:23:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07007a000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000002000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 544.021360] device macvtap446 entered promiscuous mode [ 544.139561] device macvtap118 entered promiscuous mode [ 544.163472] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 544.198324] device macvtap419 entered promiscuous mode 20:23:46 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x104, 0x1, 0x1, 0x5, 0x4, @local}, @tipc=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x2}}, @can={0x1d, 0x0}, 0xfff, 0x0, 0x0, 0x0, 0x100, &(0x7f0000000040)='veth0_to_hsr\x00', 0x400, 0x0, 0x7ff}) connect$packet(r5, &(0x7f0000000180)={0x11, 0x5, r6, 0x1, 0x7, 0x6, @random="90a1aff33746"}, 0x14) close(r3) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e21, 0x3ff, @local}, 0x4) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r3, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r3, r7) ftruncate(r7, 0x3) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r10, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000003000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070081000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:46 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000c1d0f1b1258e0000000800040000000000"], 0x30}}, 0x0) [ 544.534956] device macvtap447 entered promiscuous mode [ 544.543281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 544.572123] device macvtap119 entered promiscuous mode 20:23:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000004000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 544.611437] device macvtap420 entered promiscuous mode 20:23:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e8f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07019e000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:47 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000000c0)={0x990000, 0x7, 0x3, r1, 0x0, &(0x7f0000000040)={0x9b090b, 0x7, [], @string=&(0x7f0000000000)=0xc8}}) sendmsg$NLBL_CALIPSO_C_ADD(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x43004000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c001000454e15a61c58b2d3c7e8d7d21fa1", @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf25010000000800010001000000080001000300000008000100cebe166208000200020000000800020002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x437a7ee12033c5f6}, 0x4000008) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000180)=0x2, 0x4) [ 544.803064] device macvtap120 entered promiscuous mode [ 544.865527] device macvtap448 entered promiscuous mode [ 544.903432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 544.928762] validate_nla: 33 callbacks suppressed [ 544.928771] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0787a0000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:47 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x20000000) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b5103d0928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f7aa6bacafb3ef764f543be694b0ae8c478cd5e8d69d127060615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def3551c1a4191c6d230833c8d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c5161", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000e3d4000000e0ff000010", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) 20:23:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000005000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 545.092703] device macvtap421 entered promiscuous mode [ 545.108213] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 545.218518] device macvtap449 entered promiscuous mode [ 545.235694] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 545.236618] kauditd_printk_skb: 10 callbacks suppressed 20:23:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 545.236635] audit: type=1804 audit(1578601427.666:399): pid=25612 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/637/bus" dev="sda1" ino=16700 res=1 [ 545.303805] device macvtap121 entered promiscuous mode [ 545.344528] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 545.419420] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0705a1000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:48 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x27) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000400)=0xe0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00&\x00\x00\x00\b\x00'/20, @ANYRES32=0x0, @ANYBLOB="e2ff000050dab5a9f84040bf22e477bdf29e0d17eb7d8b1b000000002000000000"], 0x30}}, 0x0) [ 545.539841] device macvtap422 entered promiscuous mode 20:23:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000001f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 545.577003] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000006000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 545.617563] device macvtap450 entered promiscuous mode 20:23:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 545.664679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 545.701531] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 545.771346] device macvtap122 entered promiscuous mode [ 545.789687] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 545.893412] device macvtap423 entered promiscuous mode [ 545.922636] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 545.940033] audit: type=1804 audit(1578601428.376:400): pid=25640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/637/bus" dev="sda1" ino=16700 res=1 [ 546.044632] device macvtap451 entered promiscuous mode 20:23:48 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x36da40, 0x120) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0xb7a9bef99ff17106, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000007000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0701aa000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f1f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:48 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r3, r6, 0x0, 0x80001d00c0d0) kcmp(0x0, r5, 0x0, r3, r4) sendmmsg(r3, &(0x7f0000004b40), 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r7, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0x9}, @timestamp, @timestamp, @mss={0x2, 0x2}], 0x4) sendmmsg(r7, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x16, 0x0, &(0x7f0000000340)) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r11, 0x84, 0x16, 0x0, &(0x7f0000000340)) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r12, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r7, @ANYRESHEX=r2, @ANYRESDEC=r11, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r7, @ANYRESHEX=r7, @ANYBLOB="a365fb9d05e21734959fa0026e93fbe12b1b4e656a36af315d424830427755e59f9695c8ea8ebdf5c7c66b774317826f89373792042d332b97c7e72cd437b4d8d68d921f7c06b79870c5769ada29658ac4b510960928bc5abeb01ed6d68dabbe17a15f97ce35f5276f82368a99a35f0f0700bacafb3ef764f543be694b0ae8c478cd5e8d69d1278c0615fe9ddfce3107fee2c66b893f07c95ac7739460d061e672fce5f0f882ce6e91d7fb6beb31865f7bf1425ef961d55151dc5bc791def38d0a4731f23c5847413162a91f6e484b4730b63ccc6a47e7a69791a01180c0480041e00072f0c95cc3fa5e8960dce0509c516100000000000000000000066e512443b2bc991b427549412e912138940b38e3b8d531fb5f844149644f035106674942ade94f589fccb50019ad", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r12]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x40004801) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r7) r13 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r13, r13) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="30000000100009083bc69ac363e5beab7f7848ca4feb1f44000000000000b2a200000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 546.170703] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 546.226388] device macvtap123 entered promiscuous mode [ 546.242161] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 546.263235] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0700f0000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000002000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 546.315084] device macvtap424 entered promiscuous mode [ 546.336237] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090000000f000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 546.411779] device macvtap452 entered promiscuous mode 20:23:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 546.440225] device macvtap124 entered promiscuous mode [ 546.479573] device macvtap425 entered promiscuous mode 20:23:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0701f4000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022f2000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 546.587466] device macvtap453 entered promiscuous mode [ 546.643869] device macvtap125 entered promiscuous mode [ 546.653630] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 546.704337] device macvtap426 entered promiscuous mode 20:23:49 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r4, r7, 0x0, 0x80001d00c0d0) kcmp(0x0, r6, 0x0, r4, r5) r8 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x278000) ppoll(&(0x7f0000000040)=[{}, {r4}, {r1, 0x4a9}, {r8, 0x826}], 0x4, 0x0, 0x0, 0x0) 20:23:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:49 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x4000001, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r1) shutdown(r1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r5, @ANYRESHEX=r1, @ANYRESDEC=r6, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r4, @ANYRESHEX=r4, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r7]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r4) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r8, r8) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, 0x0, 0x0) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0xffff}]}, 0x30}}, 0x0) 20:23:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000020000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0701fa000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000003200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 547.180361] device macvtap427 entered promiscuous mode [ 547.214382] device macvtap126 entered promiscuous mode 20:23:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000003f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 547.239576] audit: type=1804 audit(1578601429.676:401): pid=25701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/639/bus" dev="sda1" ino=16717 res=1 [ 547.277299] device macvtap454 entered promiscuous mode 20:23:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07fffe000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000028000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000019600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 547.356346] audit: type=1804 audit(1578601429.786:402): pid=25701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/639/bus" dev="sda1" ino=16717 res=1 [ 547.499431] device macvtap428 entered promiscuous mode [ 547.517298] audit: type=1804 audit(1578601429.946:403): pid=25701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/639/bus" dev="sda1" ino=16717 res=1 [ 547.577527] device macvtap127 entered promiscuous mode [ 547.639605] device macvtap455 entered promiscuous mode 20:23:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:50 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r5, 0x408c5333, &(0x7f0000000180)={0x2, 0xfffffff9, 0x0, 'queue0\x00', 0xb480}) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 547.679089] audit: type=1804 audit(1578601430.026:404): pid=25701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/639/bus" dev="sda1" ino=16717 res=1 20:23:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:50 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000380)=[@timestamp, @window={0x3, 0x40, 0x7fff}, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x200003}, @mss={0x2, 0x802}, @mss={0x2, 0x2}, @sack_perm], 0x7) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x55f) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 20:23:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070fff000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090000003f000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 547.834631] device macvtap128 entered promiscuous mode [ 547.916035] device macvtap456 entered promiscuous mode [ 547.938565] audit: type=1804 audit(1578601430.366:405): pid=25736 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/640/bus" dev="sda1" ino=16716 res=1 20:23:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077fff000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 547.968339] audit: type=1804 audit(1578601430.386:406): pid=25736 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/640/bus" dev="sda1" ino=16716 res=1 20:23:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 548.059930] device macvtap429 entered promiscuous mode [ 548.115165] device macvtap129 entered promiscuous mode 20:23:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000040000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 548.229490] device macvtap457 entered promiscuous mode 20:23:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d07feff000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:50 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r8 = dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) getpeername$packet(r8, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a40)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="a0fcffff5e00100028bd7000ffdbdf2500000000", @ANYRES32=r9, @ANYBLOB='\x00\x00'], 0x30}}, 0x20000000) 20:23:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 548.449103] device macvtap130 entered promiscuous mode [ 548.509536] device macvtap430 entered promiscuous mode [ 548.559435] device macvtap458 entered promiscuous mode [ 548.607669] audit: type=1804 audit(1578601431.046:407): pid=25739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/640/bus" dev="sda1" ino=16716 res=1 20:23:51 executing program 3: r0 = open(&(0x7f0000000140)='./bus/file0\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r3, r6, 0x0, 0x80001d00c0d0) kcmp(0x0, r5, 0x0, r3, r4) recvmmsg(r3, &(0x7f0000003180)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/28, 0x1c}], 0x1, &(0x7f0000000200)=""/153, 0x99}, 0x162fa2f5}, {{&(0x7f00000002c0)=@ipx, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/214, 0xd6}], 0x2, &(0x7f0000000500)=""/208, 0xd0}, 0x6}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000600)=""/106, 0x4f}, {&(0x7f0000000680)=""/218, 0x22e}, {&(0x7f0000000780)=""/101, 0x65}, {&(0x7f0000000800)=""/60, 0x3c}, {&(0x7f0000000840)=""/58, 0x3a}, {&(0x7f0000000880)=""/112, 0x70}, {&(0x7f0000000900)=""/60, 0x3c}, {&(0x7f0000000940)=""/60, 0x3c}], 0x8, &(0x7f0000000a00)=""/107, 0x6b}, 0x5}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000a80)=""/171, 0xab}, {&(0x7f0000000b40)=""/4096, 0x1233}, {&(0x7f0000003340)=""/19, 0x13}], 0x3, &(0x7f0000001bc0)=""/71, 0x47}, 0x10001}, {{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/143, 0x8f}, {&(0x7f0000001d00)=""/77, 0x4d}, {&(0x7f0000001d80)=""/127, 0x7f}], 0x3, &(0x7f0000001e40)=""/147, 0x93}, 0x9}, {{&(0x7f0000001f00)=@hci, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}, {&(0x7f0000001fc0)=""/111, 0x6f}, {&(0x7f0000002040)=""/126, 0x7e}, {&(0x7f00000020c0)=""/86, 0x56}], 0x4, &(0x7f0000002180)=""/4096, 0x1000}, 0x6ad7}], 0x6, 0x20, &(0x7f0000003300)={0x0, 0x1c9c380}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, 0x0, 0x0) ftruncate(r10, 0x200004) sendfile(r7, r10, 0x0, 0x80001d00c0d0) kcmp(0x0, r9, 0x0, r7, r8) ptrace$cont(0x26, r9, 0x8, 0x6) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000001b40)=[@in6={0xa, 0x4e24, 0x80009, @mcast2, 0x1}], 0x362) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r11, 0x0, 0x80001d00c0d0) 20:23:51 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r8 = dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000002280)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000002200)=0xe8) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002380)='/dev/cachefiles\x00', 0x3a000, 0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x45) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, 0x0, 0x0) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000003540)={@empty, @loopback, 0x0}, &(0x7f0000003580)=0xc) r15 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000035c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003880)={0xffffffffffffffff, 0xc0, &(0x7f00000037c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003680)=0x5, 0x0, 0x0, 0x0, &(0x7f00000036c0)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000003700)={0x1, 0x3, 0x2, 0x4}, &(0x7f0000003740)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003780)=0x9}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000038c0)=@newlink={0x144, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_XDP={0x11c, 0x2b, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x4}, @IFLA_XDP_FD={0x7c, 0x1, {0xda29c9a57bd86d93, 0x2, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000400)='syzkaller\x00', 0x7, 0x8a, &(0x7f0000000600)=""/138, 0x41000, 0xa, [], r9, 0x2, r10, 0x8, &(0x7f00000023c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000002400)={0x5, 0x6, 0x3, 0xffff}, 0x10, 0x0, r11}}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x4}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x9}, @IFLA_XDP_FD={0x7c, 0x1, {0x5, 0x9, &(0x7f0000002480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@alu={0xc, 0x1, 0x7, 0x8, 0x1, 0xffffffffffffffe0, 0x1}, @jmp={0x5, 0x1, 0x6, 0xc, 0x89957dcebc7ae077, 0x18, 0xffffffffffffffe8}, @jmp={0x5, 0x0, 0x2, 0xb, 0xa, 0x6, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0xb, 0x0, 0x4, 0xfffffffffffffffc, 0x1}, @map={0x18, 0x9, 0x1, 0x0, r13}]}, &(0x7f0000002500)='syzkaller\x00', 0x1000, 0x1000, &(0x7f0000002540)=""/4096, 0x40f00, 0x4, [], r14, 0x8, r15, 0x8, &(0x7f0000003600)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000003640)={0x0, 0x7, 0xf6, 0x800}, 0x10, r16}}]}]}, 0x144}}, 0x0) 20:23:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000241000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0728ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 548.668849] audit: type=1804 audit(1578601431.086:408): pid=25739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/640/bus" dev="sda1" ino=16716 res=1 [ 548.776844] device macvtap131 entered promiscuous mode [ 548.840847] device macvtap431 entered promiscuous mode 20:23:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000004c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0729ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 548.940868] device macvtap459 entered promiscuous mode [ 549.010427] nla_parse: 6 callbacks suppressed [ 549.010437] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:51 executing program 3: setxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "7bb42262bcf0ddeeee46176201e8942d9c25a71a"}, 0x15, 0x3) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 549.100846] device macvtap132 entered promiscuous mode 20:23:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:51 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=@newlink={0xbc, 0x10, 0x801, 0x0, 0x3, {}, [@IFLA_PORT_SELF={0x94, 0x19, [@IFLA_PORT_PROFILE={0x3f, 0x2, 'keyring.user-cpuset\x0e}vboxnet0selinux*!{md5sumvmnet0vmnet0c\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7f}, @IFLA_PORT_VF={0x0, 0x1, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6}, @IFLA_PORT_VF={0x8, 0x1, 0x200}, @IFLA_PORT_VF={0xffffff56}, @IFLA_PORT_PROFILE={0x0, 0x2, '{(-&cpusetsystem^\x00\xa8\xa6\x1e9\xbb\x9e^d\xef\'D\xe1\xdf'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "417eee598d522b4ff932b5e4bb544908"}]}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0xbc}}, 0x0) 20:23:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000048000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000034c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d072aec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 549.273275] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 549.363641] device macvtap460 entered promiscuous mode 20:23:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9b00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090000004c000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:51 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x6, 0x8, 0x4, 0x20000, 0x6, {0x77359400}, {0x5, 0x8, 0xf6, 0x8, 0x1f, 0x6, "319a359a"}, 0x32c, 0x3, @offset=0x8001, 0x7fff, 0x0, r0}) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000180)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r1, r5, 0x0, 0x80001d00c0d0) kcmp(0x0, r4, 0x0, r1, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, r0, 0x0, 0x8, &(0x7f0000000000)='vmnet1\'\x00'}, 0x30) ptrace$pokeuser(0x6, r6, 0x6, 0x0) ftruncate(r0, 0x200004) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r7, r9, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r7, 0xa9}], 0x3, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r9, 0xc04c5349, &(0x7f00000001c0)={0x1, 0x8, 0x2}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000240)) [ 549.461700] device macvtap432 entered promiscuous mode [ 549.586958] device macvtap133 entered promiscuous mode 20:23:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000006000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 549.653117] device macvtap461 entered promiscuous mode [ 549.669184] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000060000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 549.791678] device macvtap462 entered promiscuous mode 20:23:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d072bec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:52 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 549.852570] device macvtap433 entered promiscuous mode 20:23:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9d00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 549.882024] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 549.922411] device macvtap134 entered promiscuous mode 20:23:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000586500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000068000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 550.047760] validate_nla: 31 callbacks suppressed [ 550.047772] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d072cec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 550.145268] device macvtap463 entered promiscuous mode [ 550.182753] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 550.273965] device macvtap434 entered promiscuous mode 20:23:52 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a80b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f2bb35cccc54e00d2d3bdcac51268e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000380)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) [ 550.295624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 550.320709] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 550.341700] device macvtap135 entered promiscuous mode [ 550.369897] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 550.457158] device macvtap464 entered promiscuous mode 20:23:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d072dec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000006800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090000006c000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffff9e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:53 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 550.618869] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 550.673368] kauditd_printk_skb: 5 callbacks suppressed [ 550.673387] audit: type=1804 audit(1578601433.106:414): pid=25874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/644/bus" dev="sda1" ino=16756 res=1 20:23:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d072eec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 550.715159] audit: type=1804 audit(1578601433.146:415): pid=25874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/644/bus" dev="sda1" ino=16756 res=1 [ 550.744397] device macvtap136 entered promiscuous mode [ 550.750824] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 550.816067] device macvtap435 entered promiscuous mode [ 550.834989] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000006c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 550.895723] device macvtap465 entered promiscuous mode [ 550.914830] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:53 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x0) [ 550.954363] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 550.996666] device macvtap137 entered promiscuous mode [ 551.017394] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022e9f00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000074000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 551.062479] device macvtap436 entered promiscuous mode 20:23:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d072fec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000026c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 551.153417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 551.216749] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 551.276038] device macvtap466 entered promiscuous mode 20:23:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090000007a000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 551.311762] device macvtap138 entered promiscuous mode 20:23:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 551.422942] device macvtap437 entered promiscuous mode 20:23:53 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) close(r2) shutdown(r2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000040), 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x16, 0x0, &(0x7f0000000340)) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r9, 0x84, 0x16, 0x0, &(0x7f0000000340)) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x16, 0x0, &(0x7f0000000340)) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, 0x0, 0x0) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff53, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYRES16=r0, @ANYRESDEC], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r5) r13 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r13, r13) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="9c1207e1206bd530e9820010000108005c7df6fdffffffffffffff", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) 20:23:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0730ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 551.498984] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 551.586749] audit: type=1804 audit(1578601434.016:416): pid=25874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/644/bus" dev="sda1" ino=16756 res=1 [ 551.598944] device macvtap467 entered promiscuous mode [ 551.621903] audit: type=1804 audit(1578601434.056:417): pid=25911 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/644/bus" dev="sda1" ino=16756 res=1 20:23:54 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x80, 0x20) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x100) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000001540)={r7, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000001600)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r7, 0x5314, 0x10}, &(0x7f0000000480)=0xc) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={r7, 0x6c, "767fc5a82235d7d2240156e3b13ceccaf7303bbc5f16a6162538f26a2435390159da41fc6c32b9075b123468c6f5903fbbf654856eb4d5b2d4a00c4a7103a159904b96f4e4840b25393bc160e84752dfa56695951d8afb22a67be27c3517129a126d0a9d499403bf9852909d"}, &(0x7f00000000c0)=0x74) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r8, 0x7}, &(0x7f0000000180)=0x8) 20:23:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000000e7000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 551.710373] device macvtap139 entered promiscuous mode 20:23:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000081000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 551.755519] device macvtap438 entered promiscuous mode 20:23:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0731ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000007400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 551.958406] device macvtap468 entered promiscuous mode [ 551.966733] audit: type=1804 audit(1578601434.386:418): pid=25924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/645/bus" dev="sda1" ino=16521 res=1 20:23:54 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3014, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r11 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x89401, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, 0x0, 0x0) ftruncate(r10, 0x200004) sendfile(r7, r10, 0x0, 0x80001d00c0d0) kcmp(0x0, r9, 0x0, r7, r8) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32, @ANYRESDEC=r1, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=r7], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r12 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r12, r12) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000000000009000000f60800040000000000"], 0x30}}, 0x0) [ 552.031783] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.074142] audit: type=1804 audit(1578601434.506:419): pid=25924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/645/bus" dev="sda1" ino=16521 res=1 [ 552.165647] device macvtap140 entered promiscuous mode 20:23:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09ffffff9e000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 552.237699] device macvtap439 entered promiscuous mode [ 552.258730] audit: type=1804 audit(1578601434.676:420): pid=25935 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/645/bus" dev="sda1" ino=16521 res=1 20:23:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.327807] device macvtap469 entered promiscuous mode 20:23:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0732ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.394099] device macvtap470 entered promiscuous mode [ 552.462401] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.507672] audit: type=1804 audit(1578601434.696:421): pid=25940 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/645/bus" dev="sda1" ino=16521 res=1 20:23:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000007a00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:55 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @timestamp, @mss={0x2, 0x7}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff66, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000006ba8691d8413be2f08080000005d5d70"], 0x30}}, 0x0) 20:23:55 executing program 3: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10008400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x3, 0x2, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000380)={0xc87e, 0x2944ba3, 0x9, 0x5, 0x1, 0x1}) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') listxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/22, 0x16) sendmsg$IPVS_CMD_ZERO(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="02002abd7000fcdbdf2510000000080006007f0000000800050009000000"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 552.553482] device macvtap141 entered promiscuous mode 20:23:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09008000a0000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0733ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.656312] device macvtap440 entered promiscuous mode [ 552.686441] audit: type=1800 audit(1578601434.826:422): pid=25924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16521 res=0 20:23:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000008100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.747400] device macvtap471 entered promiscuous mode 20:23:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 552.840178] audit: type=1800 audit(1578601434.826:423): pid=25935 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16521 res=0 20:23:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09000001a0000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 552.893039] device macvtap142 entered promiscuous mode [ 553.016364] device macvtap441 entered promiscuous mode 20:23:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0734ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:55 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r2) shutdown(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESHEX=r2, @ANYRESDEC=r5, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRES16, @ANYRES64=r3, @ANYRESHEX=r3, @ANYBLOB="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", @ANYPTR, @ANYRESHEX=0x0], @ANYRESHEX=r6]], 0x2}, 0x1, 0x0, 0x0, 0x2000444}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r7, r7) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000008000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 553.109700] device macvtap472 entered promiscuous mode 20:23:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffa88800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09fffffff0000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 553.321625] device macvtap143 entered promiscuous mode [ 553.420628] device macvtap442 entered promiscuous mode 20:23:55 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x3010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x30}}], 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x0, @remote}], 0x10) sendmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f20a00b5f9a7715919be87aeaa6f8aaa4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) close(r0) shutdown(r0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x16, 0x0, &(0x7f0000000340)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x16, 0x0, &(0x7f0000000340)) [ 553.491531] device macvtap473 entered promiscuous mode 20:23:56 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:23:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0735ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffff9e00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900f0ffff000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 553.739267] device macvtap474 entered promiscuous mode [ 553.768351] device macvtap144 entered promiscuous mode 20:23:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0736ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 553.824344] device macvtap443 entered promiscuous mode 20:23:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c097fffffff000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000002b000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.009238] device macvtap475 entered promiscuous mode 20:23:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0737ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.062390] device macvtap145 entered promiscuous mode [ 554.071430] nla_parse: 5 callbacks suppressed [ 554.071441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ea900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.194875] device macvtap444 entered promiscuous mode [ 554.264801] device macvtap146 entered promiscuous mode [ 554.323814] device macvtap476 entered promiscuous mode 20:23:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0731ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.383103] device macvtap477 entered promiscuous mode [ 554.458438] device macvtap1 entered promiscuous mode 20:23:57 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$SOUND_OLD_MIXER_INFO(0xffffffffffffffff, 0x80304d65, &(0x7f0000001440)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x1, @loopback, 0x8}], 0xe) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./bus\x00', 0xffffffffffffffff, 0x5, &(0x7f0000001340)=[{&(0x7f0000000100)="a4", 0x1, 0x400}, {&(0x7f0000000180)="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", 0x1000, 0x3}, {&(0x7f0000001180)="ab89cebb511e5cf6012d8fddf884276ae8ecdfedacf7f58e2bf9dfa584a01dc3f275d5889adb4eaaf86094d9ec67", 0x2e}, {&(0x7f00000011c0)="0ca35d90ba9ee3ad5868d67b074cd47888b20dbaceaa01d3e9c6d35f5a2c1c12a0b32543766bf9b2b9f28e6a2db3579a8fc3ef68482a852e65a89c0d6640a917fb821dee28893f99f72e59b16e631c373b44557496449ecbdbb26c5848a11b818218e655c2ef37f21a0be32239a4e80666594ec6c54cc3ab86b88e8553b63558135971c159e753865a63ebc6ea7077a7954793fdc9c07be5b48fed57a2e4203172e4f9b754f6da20cb0b55fe004a4d089149b5409e67a25fd38137086e3503eca38126a6c25796b8997206d9fd21084de5db875e513802eeb72ccedc54028f48256a0d3ffd9c0fdf7bbc95451d5bda16c168efea3ac62a", 0xf7}, {&(0x7f00000012c0)="7e54c8371c83351a6ea7fb80e42dd270afaa7377c042f9575fafd2d2b5acd12f7e85205cdce536b1bfa81e63046607d3b481010699d150f72560406fcc65bc8b79fdb6b8bc", 0x45, 0x7f}], 0x18018, &(0x7f00000013c0)={[{@fat=@dmask={'dmask', 0x3d, 0xf89}}, {@shortname_winnt='shortname=winnt'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r5}}]}) 20:23:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ebb00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c099effffff000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0738ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eaa00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d070020000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eab00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.698462] device macvtap478 entered promiscuous mode [ 554.705988] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 554.729474] device macvtap445 entered promiscuous mode [ 554.742281] device macvtap2 entered promiscuous mode 20:23:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ebc00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.782486] device macvtap147 entered promiscuous mode 20:23:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0739ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09f0ffffff000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 554.852670] device macvtap479 entered promiscuous mode 20:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000c00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.908101] device macvtap446 entered promiscuous mode 20:23:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eac00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 554.951807] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 555.015597] device macvtap148 entered promiscuous mode [ 555.048690] device macvtap3 entered promiscuous mode [ 555.067113] validate_nla: 37 callbacks suppressed [ 555.067123] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 555.129734] device macvtap480 entered promiscuous mode 20:23:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d073aec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ebd00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900020000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ead00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:58 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) accept4(r2, &(0x7f0000000240)=@x25, &(0x7f00000002c0)=0x80, 0x100800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x2}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000004c0)={0x60, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000010}, 0x4004800) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x3ee, 0x4}) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80e2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x58, r5, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x810) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ebe00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 555.567968] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 555.598016] device macvtap447 entered promiscuous mode [ 555.605869] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:23:58 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000001700)=0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x8, &(0x7f0000001640)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000001180)="4e1a1b544e09d4d99b64321a5fc594be92044dd159bb60f8e7e22500b594d73134f1a8783b2d6d3109492ec29d8fa539a5a953b7a4369e8bfdca196b9445e496288ce26e80454b216ff56a634417d3f3747f3e283b5d49391bb0b1020e18d851230a83ade60c61ea6e39594c6d1e25386e56791cfc3adb609204a4384bd0a4c8b64c22019bfcebfc7e5054ce5f32de867de71d48e24fa03aa1c26b9aaba8f4ae1c1d138fbd090be990e09af348be93576619ecbdb32b652c8221d3d19f81ebf033cc5312174f31d02af66dc3b0b72f9165cbed7465a770eacf6af39bd7e607de0ce5", 0xe2, 0x2}, {&(0x7f0000001280)="902e8bd67efdbe0786ba1379b2824d4e3db84f323a570b3b6de005d4d07e688b35f95e09767574e277ad1e661b576042c3d3959c0f61b78ca3e2910853e2ff12756d189934402a9452141ee9872531c871bcf7c57d671aab51a90bb26f906b2c7fd51b9d0f4f11dc2e9f9f9097ffd2fbbc3eb40ebf14eea337b57b5b6ce191517c7c874dee32f68623ce832e364543", 0x8f}, {&(0x7f0000001340)="45c925b26fdfc0bbc53384d431864ba0661c4e2c460db4f13ad6fef7a03b0bf4517113b717f7e005b9caeca1142e3507925fab6fab4ed7800bb089c763e207dbb40532d3559b45adcbeb2ad6aa779e1ee20f0a9b20ae3e3e", 0x58, 0x6}, {&(0x7f00000013c0)="ee3fda5c4bd1ed3695a6769f69e5e94641a63cdad4b3b1cd1ccd0e84c139eca583a1e0ec6437cd36d7d0646f04612ac2aa396724ea857583c7e8a1a709ffe260a4e4a6d5e58a2aaa57e1f12a5a9da1c52a491e12dbfc0c67fa6d1211d4c70d76867e6cc1f7f7e84fe57dc3c8f3c02e470fcd69273218cc9c0ab7e40618ac68e4f19e2cf783eea964719b372ed79d79a27da7f2f1090e36bb65c973777d321b241f66e82f9b09b19b674f8c24caaa86c18efeee1ddc56a57e4cb88f4cef69766be1c8f2febdad8c59d6602f41613cb80ffe68d1b03bf274401a206a7befaf2c07872a9ce35955b7b0c2ee4409d635810740490b7e4f", 0xf5, 0x5}, {&(0x7f00000014c0)="62217a1b66d42e310b361d9a3abc5af18478921c7c6b26f8a52e218e703668e139158eddf55dc34f6a92bdbcb7adada8780af87ffdeabbcdaa1862326359f13740a4e215b3dd06ba3602d4a654f2df0e6bbab712f209af944a4b329a95264be4c53183a9a4362ef5b3a44bd09289fd409caa460b358e0427d471aa6b9c33bb7c1725fb85534a3a4a2c06e94a0596ec", 0x8f, 0xfffffffffffff801}, {&(0x7f0000000100)="e90a00c5b45f0bc374adda590a4ad482126219ba783e", 0x16}, {&(0x7f0000001580)="b9fc4d8491d6cd30c0491c9027eddc3a4f98288fc535e9783764688d78c57cbdf7929e4e458c2bd11d6df570fbcdfda2a0862b965f56d26b9de7023c9d5ffe0d4d6b66878bfdf3b8f55100f28ad94d0a6fbdee2e904c3cd8c5a4c0e96d1b8283235b7818eb0ed411bb5292c084866eed7fdd0f9d0f26483b2309f6684b956f540932fbb86a3dc86736740c5a12d334031c8e23455d10fd4f83c7e2b84201f8c2e8a2dbe54013b0f2a8f86da9b0a551cc66fb6638", 0xb4}], 0x180800a, &(0x7f0000001740)={[{@whint_mode_user='whint_mode=user-based'}, {@noacl='noacl'}, {@nobarrier='nobarrier'}, {@four_active_logs='active_logs=4'}, {@heap='heap'}, {@disable_roll_forward='disable_roll_forward'}, {@fastboot='fastboot'}, {@noinline_data='noinline_data'}, {@background_gc_sync='background_gc=sync'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}], [{@uid_eq={'uid', 0x3d, r5}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x22) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) r8 = socket$rds(0x15, 0x5, 0x0) fcntl$setflags(r8, 0x2, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) read(r7, &(0x7f0000000180)=""/4096, 0x1000) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r9, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 555.674954] device macvtap481 entered promiscuous mode [ 555.684196] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d073bec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 555.735067] device macvtap149 entered promiscuous mode [ 555.741114] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 555.771049] device macvtap4 entered promiscuous mode 20:23:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eae00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 555.784865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 555.817908] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:23:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 555.848153] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 555.884936] device macvtap448 entered promiscuous mode [ 555.887981] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 20:23:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900030000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 555.914431] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 555.944243] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 20:23:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ebf00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 555.974851] device macvtap482 entered promiscuous mode [ 555.980091] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 555.994529] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:23:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eaf00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.040643] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 556.057853] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 556.066814] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 556.068949] device macvtap150 entered promiscuous mode [ 556.074014] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 20:23:58 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) fcntl$getown(0xffffffffffffffff, 0x9) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 556.106388] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 20:23:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d073cec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.176916] device macvtap5 entered promiscuous mode [ 556.193055] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 556.213427] kauditd_printk_skb: 11 callbacks suppressed [ 556.213443] audit: type=1804 audit(1578601438.646:435): pid=26140 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/651/bus" dev="sda1" ino=16824 res=1 20:23:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dffffffffa000800000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.322757] audit: type=1804 audit(1578601438.756:436): pid=26146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/651/bus" dev="sda1" ino=16824 res=1 [ 556.354168] device macvtap449 entered promiscuous mode [ 556.366022] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.421880] device macvtap483 entered promiscuous mode 20:23:58 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r3, r6, 0x0, 0x80001d00c0d0) kcmp(0x0, r5, 0x0, r3, r4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r9, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r11, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r13, 0x0) getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, r9, 0xffffffffffffffff, r11, r13, 0xffffffffffffffff]) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x1000, 0x7ff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r17, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r2, @ANYBLOB="04000200000000000800215d", @ANYRES32=r7, @ANYBLOB="fc70d8a7", @ANYRES32=r14, @ANYBLOB="08000200", @ANYRES32=r15, @ANYBLOB="08000500", @ANYRES32=r17, @ANYBLOB="10000c00000050822000040000000000"], 0x4c, 0x2) ftruncate(r0, 0x200004) r18 = socket$inet6(0xa, 0x400000000001, 0x0) close(r18) r19 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r19, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r19, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r20 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r18, r20, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r18, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 556.451388] device macvtap151 entered promiscuous mode [ 556.487615] device macvtap6 entered promiscuous mode 20:23:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000002b000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900040000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:23:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d073dec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.584370] device macvtap450 entered promiscuous mode 20:23:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d9effffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.665739] device macvtap484 entered promiscuous mode 20:23:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 556.712337] device macvtap152 entered promiscuous mode [ 556.742987] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:59 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r1, r4, 0x0, 0x80001d00c0d0) kcmp(0x0, r3, 0x0, r1, r2) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x80000001}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000040), 0x4) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r7, r9, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r7, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 556.796961] device macvtap7 entered promiscuous mode 20:23:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d073eec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900050000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 556.887305] device macvtap451 entered promiscuous mode 20:23:59 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{r2}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:23:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d073fec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 557.015133] device macvtap485 entered promiscuous mode [ 557.024792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 557.042054] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 557.058685] audit: type=1804 audit(1578601439.486:437): pid=26190 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir170611357/syzkaller.vxP5Ew/678/bus" dev="sda1" ino=16832 res=1 20:23:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900060000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 557.176438] device macvtap153 entered promiscuous mode 20:23:59 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{r2}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 557.214813] audit: type=1804 audit(1578601439.606:438): pid=26201 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/653/bus" dev="sda1" ino=16814 res=1 [ 557.254423] device macvtap452 entered promiscuous mode 20:23:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0740ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:23:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 557.321641] device macvtap486 entered promiscuous mode [ 557.353734] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:59 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{r2}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 557.395496] audit: type=1804 audit(1578601439.826:439): pid=26209 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir170611357/syzkaller.vxP5Ew/679/bus" dev="sda1" ino=16812 res=1 [ 557.507122] device macvtap453 entered promiscuous mode [ 557.559103] device macvtap154 entered promiscuous mode [ 557.591880] audit: type=1804 audit(1578601440.026:440): pid=26221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir170611357/syzkaller.vxP5Ew/680/bus" dev="sda1" ino=16803 res=1 20:24:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900070000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffffc300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0741ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00022eda0000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 557.652277] audit: type=1804 audit(1578601440.086:441): pid=26192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/653/bus" dev="sda1" ino=16814 res=1 20:24:00 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r1, r4, 0x0, 0x80001d00c0d0) kcmp(0x0, r3, 0x0, r1, r2) ftruncate(0xffffffffffffffff, 0x41409626) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x2b4) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000180)={0x5, [0x8f1, 0x81, 0x81], [{0xe7, 0x100, 0x0, 0x1, 0x0, 0x1}, {0x5, 0x5, 0x0, 0x0, 0x0, 0x1}, {0x5, 0x0, 0x1, 0x1, 0x1}, {0x8, 0x73d, 0x1, 0x0, 0x0, 0x1}, {0x5, 0x3, 0x0, 0x0, 0x0, 0x1}, {0x1, 0x80, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x80000001, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}, {0x4fb, 0x3, 0x0, 0x0, 0x1}, {0x10001, 0x2, 0x0, 0x0, 0x1, 0x1}, {0x6, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x906, 0x2, 0x0, 0x0, 0x1, 0x1}], 0xfffffffc}) sendfile(r5, r7, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r5, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 557.780179] device macvtap487 entered promiscuous mode 20:24:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 557.820202] device macvtap8 entered promiscuous mode [ 557.835448] audit: type=1804 audit(1578601440.266:442): pid=26238 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/654/bus" dev="sda1" ino=16837 res=1 [ 557.839398] device macvtap155 entered promiscuous mode 20:24:00 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x0, 0x0, 0x0, 0x0) 20:24:00 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0742ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 558.002606] device macvtap454 entered promiscuous mode [ 558.004830] audit: type=1804 audit(1578601440.436:443): pid=26245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/655/bus" dev="sda1" ino=16807 res=1 [ 558.034554] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 558.051941] FAULT_INJECTION: forcing a failure. [ 558.051941] name failslab, interval 1, probability 0, space 0, times 0 [ 558.100753] CPU: 1 PID: 26247 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 558.104601] device macvtap488 entered promiscuous mode [ 558.108626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.108633] Call Trace: [ 558.108664] dump_stack+0x197/0x210 [ 558.108690] should_fail.cold+0xa/0x1b [ 558.108709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.108727] ? lock_downgrade+0x880/0x880 [ 558.108752] __should_failslab+0x121/0x190 [ 558.108770] should_failslab+0x9/0x14 [ 558.108785] kmem_cache_alloc_node+0x26c/0x710 [ 558.108814] __alloc_skb+0xd5/0x5f0 [ 558.108833] ? skb_trim+0x190/0x190 [ 558.108848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.108870] ? netlink_autobind.isra.0+0x228/0x310 [ 558.123526] netlink_sendmsg+0x97b/0xd70 [ 558.129717] ? netlink_unicast+0x730/0x730 [ 558.129752] ? selinux_socket_sendmsg+0x36/0x40 [ 558.129773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.162748] ? security_socket_sendmsg+0x8d/0xc0 [ 558.177294] ? netlink_unicast+0x730/0x730 [ 558.177322] sock_sendmsg+0xd7/0x130 [ 558.177341] ___sys_sendmsg+0x803/0x920 [ 558.177367] ? copy_msghdr_from_user+0x430/0x430 [ 558.209184] ? lock_downgrade+0x880/0x880 [ 558.209207] ? kasan_check_read+0x11/0x20 [ 558.218108] ? __fget+0x367/0x540 [ 558.218131] ? iterate_fd+0x360/0x360 [ 558.218161] ? __fget_light+0x1a9/0x230 [ 558.218181] ? __fdget+0x1b/0x20 [ 558.225776] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.225801] __sys_sendmsg+0x105/0x1d0 [ 558.225816] ? __ia32_sys_shutdown+0x80/0x80 20:24:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 558.225850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 558.233594] ? do_syscall_64+0x26/0x620 [ 558.233626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.233644] ? do_syscall_64+0x26/0x620 [ 558.242536] __x64_sys_sendmsg+0x78/0xb0 [ 558.242557] do_syscall_64+0xfd/0x620 [ 558.242582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.250855] RIP: 0033:0x45af49 [ 558.250874] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.250883] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 558.250899] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 558.250907] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 558.250919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 558.259634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 [ 558.259643] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 [ 558.364426] device macvtap455 entered promiscuous mode 20:24:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09000f0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:00 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 558.386911] device macvtap156 entered promiscuous mode 20:24:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 558.431927] device macvtap489 entered promiscuous mode 20:24:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0743ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 558.526331] FAULT_INJECTION: forcing a failure. [ 558.526331] name failslab, interval 1, probability 0, space 0, times 0 [ 558.591775] device macvtap490 entered promiscuous mode [ 558.592353] CPU: 1 PID: 26264 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 558.604918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.614292] Call Trace: [ 558.614332] dump_stack+0x197/0x210 [ 558.614360] should_fail.cold+0xa/0x1b [ 558.614383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.614404] ? lock_downgrade+0x880/0x880 [ 558.620640] __should_failslab+0x121/0x190 [ 558.620660] should_failslab+0x9/0x14 [ 558.629653] kmem_cache_alloc_node_trace+0x274/0x720 [ 558.629676] ? __alloc_skb+0xd5/0x5f0 [ 558.646983] __kmalloc_node_track_caller+0x3d/0x80 [ 558.647008] __kmalloc_reserve.isra.0+0x40/0xf0 [ 558.647027] __alloc_skb+0x10b/0x5f0 [ 558.660452] ? skb_trim+0x190/0x190 [ 558.660475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.660494] ? netlink_autobind.isra.0+0x228/0x310 [ 558.660515] netlink_sendmsg+0x97b/0xd70 [ 558.673432] ? netlink_unicast+0x730/0x730 [ 558.686740] ? selinux_socket_sendmsg+0x36/0x40 [ 558.691425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.691442] ? security_socket_sendmsg+0x8d/0xc0 [ 558.691463] ? netlink_unicast+0x730/0x730 [ 558.701754] sock_sendmsg+0xd7/0x130 [ 558.701773] ___sys_sendmsg+0x803/0x920 [ 558.701794] ? copy_msghdr_from_user+0x430/0x430 [ 558.710913] ? lock_downgrade+0x880/0x880 [ 558.710936] ? kasan_check_read+0x11/0x20 [ 558.710959] ? __fget+0x367/0x540 [ 558.710979] ? iterate_fd+0x360/0x360 [ 558.719703] ? __fget_light+0x1a9/0x230 20:24:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900280000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 558.719721] ? __fdget+0x1b/0x20 [ 558.719738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.719758] __sys_sendmsg+0x105/0x1d0 [ 558.719775] ? __ia32_sys_shutdown+0x80/0x80 [ 558.728093] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 558.728110] ? do_syscall_64+0x26/0x620 [ 558.728125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.728142] ? do_syscall_64+0x26/0x620 [ 558.742775] __x64_sys_sendmsg+0x78/0xb0 [ 558.756598] do_syscall_64+0xfd/0x620 [ 558.756622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.756635] RIP: 0033:0x45af49 [ 558.756649] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.756661] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 558.782964] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 558.782974] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 558.782983] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 558.782991] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 [ 558.782999] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 [ 558.862305] device macvtap456 entered promiscuous mode 20:24:01 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:01 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 558.872148] audit: type=1800 audit(1578601441.306:444): pid=26279 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16807 res=0 [ 558.898133] device macvtap157 entered promiscuous mode [ 558.981930] device macvtap491 entered promiscuous mode [ 558.982396] FAULT_INJECTION: forcing a failure. [ 558.982396] name failslab, interval 1, probability 0, space 0, times 0 [ 559.004379] CPU: 0 PID: 26286 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 559.012212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.021582] Call Trace: [ 559.024203] dump_stack+0x197/0x210 [ 559.027885] should_fail.cold+0xa/0x1b [ 559.031802] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.036937] ? netlink_deliver_tap+0x146/0xc20 [ 559.041548] __should_failslab+0x121/0x190 [ 559.045811] should_failslab+0x9/0x14 [ 559.049646] kmem_cache_alloc+0x47/0x700 [ 559.053723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.053753] ? check_preemption_disabled+0x48/0x290 [ 559.053770] ? lock_acquire+0x16f/0x3f0 [ 559.053796] skb_clone+0x156/0x3e0 [ 559.064348] netlink_deliver_tap+0x97b/0xc20 [ 559.064378] netlink_unicast+0x5ae/0x730 20:24:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0744ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 559.064401] ? netlink_attachskb+0x770/0x770 [ 559.064424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.071941] netlink_sendmsg+0x8ae/0xd70 [ 559.071967] ? netlink_unicast+0x730/0x730 [ 559.071992] ? selinux_socket_sendmsg+0x36/0x40 [ 559.072014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.080471] ? security_socket_sendmsg+0x8d/0xc0 [ 559.080491] ? netlink_unicast+0x730/0x730 [ 559.080514] sock_sendmsg+0xd7/0x130 [ 559.080532] ___sys_sendmsg+0x803/0x920 [ 559.080552] ? copy_msghdr_from_user+0x430/0x430 [ 559.090494] ? lock_downgrade+0x880/0x880 [ 559.090518] ? kasan_check_read+0x11/0x20 [ 559.090541] ? __fget+0x367/0x540 [ 559.090562] ? iterate_fd+0x360/0x360 [ 559.090585] ? __fget_light+0x1a9/0x230 [ 559.090601] ? __fdget+0x1b/0x20 [ 559.090616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.090636] __sys_sendmsg+0x105/0x1d0 [ 559.098969] ? __ia32_sys_shutdown+0x80/0x80 [ 559.099006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.099023] ? do_syscall_64+0x26/0x620 [ 559.099040] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.099053] ? do_syscall_64+0x26/0x620 [ 559.099072] __x64_sys_sendmsg+0x78/0xb0 [ 559.099088] do_syscall_64+0xfd/0x620 [ 559.099112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.109316] RIP: 0033:0x45af49 [ 559.109333] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.109341] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:24:01 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r8, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r8}]]}}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', r8}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000040)={@loopback, 0x76, r8}) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900480000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 559.109357] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 559.109367] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 559.109376] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 559.109385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 [ 559.109394] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 [ 559.295071] device macvtap158 entered promiscuous mode [ 559.375617] device macvtap9 entered promiscuous mode 20:24:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0745ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:01 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 559.398474] device macvtap457 entered promiscuous mode 20:24:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 559.472945] device macvtap492 entered promiscuous mode [ 559.488311] nla_parse: 2 callbacks suppressed [ 559.488320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 559.601860] device macvtap493 entered promiscuous mode [ 559.615662] device macvtap159 entered promiscuous mode [ 559.631576] FAULT_INJECTION: forcing a failure. [ 559.631576] name failslab, interval 1, probability 0, space 0, times 0 [ 559.650153] CPU: 0 PID: 26313 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 559.658003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.667372] Call Trace: [ 559.670101] dump_stack+0x197/0x210 [ 559.673840] should_fail.cold+0xa/0x1b [ 559.677804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.682922] ? lock_downgrade+0x880/0x880 [ 559.687127] __should_failslab+0x121/0x190 [ 559.691361] should_failslab+0x9/0x14 [ 559.695157] kmem_cache_alloc_node_trace+0x274/0x720 [ 559.700398] __kmalloc_node+0x3d/0x80 [ 559.704214] kvmalloc_node+0xbd/0x100 [ 559.708085] alloc_netdev_mqs+0x98/0xdb0 [ 559.713251] ? macvtap_update_features+0x70/0x70 [ 559.718038] rtnl_create_link+0x1dd/0xa00 [ 559.722206] ? netlink_ns_capable+0x26/0x30 [ 559.726548] rtnl_newlink+0xf3f/0x1600 [ 559.730456] ? rtnl_link_unregister+0x250/0x250 [ 559.735236] ? trace_hardirqs_off+0x62/0x220 [ 559.739720] ? __lock_acquire+0x6ee/0x49c0 [ 559.743949] ? __lock_is_held+0xb6/0x140 [ 559.748017] ? rcu_read_unlock+0x16/0x60 [ 559.752094] ? mark_held_locks+0x100/0x100 [ 559.756348] ? finish_task_switch+0x146/0x7c0 [ 559.760849] ? __lock_acquire+0x6ee/0x49c0 [ 559.765438] ? finish_task_switch+0x146/0x7c0 [ 559.769938] ? mark_held_locks+0xb1/0x100 [ 559.774094] ? mark_held_locks+0x100/0x100 [ 559.778352] ? _raw_spin_unlock_irq+0x5e/0x90 [ 559.782874] ? finish_task_switch+0x146/0x7c0 [ 559.787385] ? finish_task_switch+0x118/0x7c0 [ 559.791888] ? switch_mm_irqs_off+0x7fa/0x1360 [ 559.796482] ? __mutex_lock+0xa67/0x1300 [ 559.800551] ? find_held_lock+0x35/0x130 [ 559.804644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.810249] ? rtnl_link_unregister+0x250/0x250 [ 559.814945] rtnetlink_rcv_msg+0x463/0xb00 [ 559.819376] ? rtnetlink_put_metrics+0x560/0x560 [ 559.824140] ? netdev_pick_tx+0x300/0x300 [ 559.828291] ? netlink_deliver_tap+0x22d/0xc20 [ 559.832881] ? find_held_lock+0x35/0x130 [ 559.836968] netlink_rcv_skb+0x17d/0x460 [ 559.841045] ? rtnetlink_put_metrics+0x560/0x560 [ 559.845794] ? netlink_ack+0xb30/0xb30 [ 559.849675] ? kasan_check_read+0x11/0x20 [ 559.853814] ? netlink_deliver_tap+0x254/0xc20 [ 559.858413] rtnetlink_rcv+0x1d/0x30 [ 559.862133] netlink_unicast+0x53a/0x730 [ 559.866369] ? netlink_attachskb+0x770/0x770 [ 559.870789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.876407] netlink_sendmsg+0x8ae/0xd70 [ 559.880463] ? netlink_unicast+0x730/0x730 [ 559.884711] ? selinux_socket_sendmsg+0x36/0x40 [ 559.889468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.895018] ? security_socket_sendmsg+0x8d/0xc0 [ 559.899784] ? netlink_unicast+0x730/0x730 [ 559.904036] sock_sendmsg+0xd7/0x130 [ 559.907770] ___sys_sendmsg+0x803/0x920 [ 559.911750] ? copy_msghdr_from_user+0x430/0x430 [ 559.916527] ? lock_downgrade+0x880/0x880 [ 559.920689] ? kasan_check_read+0x11/0x20 [ 559.924848] ? __fget+0x367/0x540 [ 559.928302] ? iterate_fd+0x360/0x360 [ 559.932253] ? __fget_light+0x1a9/0x230 [ 559.936256] ? __fdget+0x1b/0x20 [ 559.939618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.945154] __sys_sendmsg+0x105/0x1d0 [ 559.949063] ? __ia32_sys_shutdown+0x80/0x80 [ 559.953486] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.958254] ? do_syscall_64+0x26/0x620 [ 559.962280] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.967690] ? do_syscall_64+0x26/0x620 [ 559.971690] __x64_sys_sendmsg+0x78/0xb0 [ 559.975810] do_syscall_64+0xfd/0x620 [ 559.979627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.984821] RIP: 0033:0x45af49 20:24:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eb900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 559.988006] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.006902] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 560.014604] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 560.021871] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 560.029128] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 560.036405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 [ 560.043690] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 20:24:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0746ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:02 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 560.105280] device macvtap10 entered promiscuous mode [ 560.116585] validate_nla: 34 callbacks suppressed [ 560.116595] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09004c0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 560.204068] device macvtap458 entered promiscuous mode [ 560.229839] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 560.241356] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:02 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100)=0x8, 0x4) r3 = socket$inet6(0xa, 0x400000000001, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4000, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x28) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 560.270820] device macvtap494 entered promiscuous mode [ 560.292196] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 560.315356] device macvtap160 entered promiscuous mode [ 560.320996] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 560.329883] FAULT_INJECTION: forcing a failure. [ 560.329883] name failslab, interval 1, probability 0, space 0, times 0 [ 560.341289] CPU: 0 PID: 26333 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 560.349112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.358668] Call Trace: [ 560.361291] dump_stack+0x197/0x210 [ 560.364956] should_fail.cold+0xa/0x1b [ 560.368876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.373991] ? find_held_lock+0x35/0x130 [ 560.374029] __should_failslab+0x121/0x190 [ 560.374050] should_failslab+0x9/0x14 [ 560.374064] kmem_cache_alloc_trace+0x4b/0x760 [ 560.374090] __hw_addr_create_ex+0x5e/0x310 [ 560.386180] __hw_addr_add_ex+0x1ef/0x2b0 [ 560.386204] dev_addr_init+0x118/0x200 [ 560.386221] ? dev_mc_flush+0x40/0x40 [ 560.386243] ? __kmalloc_node+0x51/0x80 [ 560.386266] alloc_netdev_mqs+0x142/0xdb0 [ 560.415133] ? macvtap_update_features+0x70/0x70 [ 560.419928] rtnl_create_link+0x1dd/0xa00 [ 560.424235] ? netlink_ns_capable+0x26/0x30 [ 560.428584] rtnl_newlink+0xf3f/0x1600 [ 560.432506] ? rtnl_link_unregister+0x250/0x250 [ 560.437191] ? mark_held_locks+0x100/0x100 20:24:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0747ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 560.441478] ? __lock_acquire+0x6ee/0x49c0 [ 560.445732] ? cpuacct_charge+0x1db/0x360 [ 560.449915] ? __update_load_avg_se+0x5ec/0xa10 [ 560.449935] ? __lock_is_held+0xb6/0x140 [ 560.458676] ? mark_held_locks+0x100/0x100 [ 560.462946] ? finish_task_switch+0x146/0x7c0 [ 560.467464] ? __lock_acquire+0x6ee/0x49c0 [ 560.471715] ? finish_task_switch+0x146/0x7c0 [ 560.476234] ? mark_held_locks+0xb1/0x100 [ 560.480491] ? mark_held_locks+0x100/0x100 [ 560.484749] ? _raw_spin_unlock_irq+0x5e/0x90 [ 560.489269] ? finish_task_switch+0x146/0x7c0 [ 560.493787] ? finish_task_switch+0x118/0x7c0 [ 560.498304] ? switch_mm_irqs_off+0x7fa/0x1360 [ 560.502908] ? __mutex_lock+0xa67/0x1300 [ 560.506995] ? find_held_lock+0x35/0x130 [ 560.511097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.516646] ? rtnl_link_unregister+0x250/0x250 [ 560.521323] rtnetlink_rcv_msg+0x463/0xb00 [ 560.525552] ? rtnetlink_put_metrics+0x560/0x560 [ 560.530301] ? netdev_pick_tx+0x300/0x300 [ 560.534445] ? netlink_deliver_tap+0x22d/0xc20 [ 560.539031] ? find_held_lock+0x35/0x130 [ 560.543119] netlink_rcv_skb+0x17d/0x460 [ 560.547207] ? rtnetlink_put_metrics+0x560/0x560 [ 560.551974] ? netlink_ack+0xb30/0xb30 [ 560.555871] ? kasan_check_read+0x11/0x20 [ 560.560043] ? netlink_deliver_tap+0x254/0xc20 [ 560.564645] rtnetlink_rcv+0x1d/0x30 [ 560.568369] netlink_unicast+0x53a/0x730 [ 560.572437] ? netlink_attachskb+0x770/0x770 [ 560.576857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.582442] netlink_sendmsg+0x8ae/0xd70 [ 560.586511] ? netlink_unicast+0x730/0x730 [ 560.590754] ? selinux_socket_sendmsg+0x36/0x40 [ 560.595436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.600989] ? security_socket_sendmsg+0x8d/0xc0 [ 560.605751] ? netlink_unicast+0x730/0x730 [ 560.609984] sock_sendmsg+0xd7/0x130 [ 560.613723] ___sys_sendmsg+0x803/0x920 [ 560.617736] ? copy_msghdr_from_user+0x430/0x430 [ 560.622525] ? lock_downgrade+0x880/0x880 [ 560.626706] ? kasan_check_read+0x11/0x20 [ 560.630879] ? __fget+0x367/0x540 [ 560.634332] ? iterate_fd+0x360/0x360 [ 560.638154] ? __fget_light+0x1a9/0x230 [ 560.642139] ? __fdget+0x1b/0x20 [ 560.645503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.651050] __sys_sendmsg+0x105/0x1d0 [ 560.654941] ? __ia32_sys_shutdown+0x80/0x80 [ 560.659379] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.664148] ? do_syscall_64+0x26/0x620 [ 560.668161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.673541] ? do_syscall_64+0x26/0x620 [ 560.677539] __x64_sys_sendmsg+0x78/0xb0 [ 560.681619] do_syscall_64+0xfd/0x620 [ 560.685430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.690615] RIP: 0033:0x45af49 [ 560.693799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.712707] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 560.721564] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 560.728848] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 560.736140] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 560.743678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 [ 560.751008] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 [ 560.761578] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:03 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 560.790675] device macvtap459 entered promiscuous mode [ 560.796690] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 560.835047] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 560.886046] device macvtap495 entered promiscuous mode [ 560.903089] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 560.922239] device macvtap161 entered promiscuous mode 20:24:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eba00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900600000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 560.937480] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0748ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 561.058083] device macvtap460 entered promiscuous mode [ 561.075573] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 561.083789] FAULT_INJECTION: forcing a failure. [ 561.083789] name failslab, interval 1, probability 0, space 0, times 0 [ 561.112437] CPU: 1 PID: 26350 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 561.120271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.120279] Call Trace: [ 561.120307] dump_stack+0x197/0x210 [ 561.120337] should_fail.cold+0xa/0x1b [ 561.120362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 561.120383] ? lock_downgrade+0x880/0x880 [ 561.120411] __should_failslab+0x121/0x190 [ 561.120428] should_failslab+0x9/0x14 [ 561.120442] kmem_cache_alloc_node_trace+0x274/0x720 [ 561.120462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.153433] ? dev_addr_init+0x17f/0x200 [ 561.153462] __kmalloc_node+0x3d/0x80 [ 561.153482] kvmalloc_node+0x68/0x100 [ 561.153502] alloc_netdev_mqs+0x6e4/0xdb0 [ 561.183737] ? macvtap_update_features+0x70/0x70 [ 561.183763] rtnl_create_link+0x1dd/0xa00 [ 561.183779] ? netlink_ns_capable+0x26/0x30 [ 561.183800] rtnl_newlink+0xf3f/0x1600 [ 561.192704] ? rtnl_link_unregister+0x250/0x250 [ 561.205576] ? trace_hardirqs_off+0x62/0x220 [ 561.210029] ? __lock_acquire+0x6ee/0x49c0 [ 561.214726] ? __lock_is_held+0xb6/0x140 [ 561.218809] ? rcu_read_unlock+0x16/0x60 [ 561.222901] ? mark_held_locks+0x100/0x100 [ 561.227150] ? finish_task_switch+0x146/0x7c0 [ 561.231640] ? __lock_acquire+0x6ee/0x49c0 [ 561.235863] ? finish_task_switch+0x146/0x7c0 [ 561.240371] ? mark_held_locks+0xb1/0x100 [ 561.244545] ? mark_held_locks+0x100/0x100 [ 561.248802] ? _raw_spin_unlock_irq+0x5e/0x90 [ 561.253316] ? finish_task_switch+0x146/0x7c0 [ 561.257833] ? finish_task_switch+0x118/0x7c0 20:24:03 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0xfff, 0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x2020}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ec900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 561.262352] ? __mutex_lock+0xa67/0x1300 [ 561.266957] ? find_held_lock+0x35/0x130 [ 561.271120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.276686] ? rtnl_link_unregister+0x250/0x250 [ 561.281383] rtnetlink_rcv_msg+0x463/0xb00 [ 561.285643] ? rtnetlink_put_metrics+0x560/0x560 [ 561.290424] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 561.295556] ? rcu_read_unlock_special+0x679/0xea0 [ 561.300518] ? netlink_deliver_tap+0x22d/0xc20 [ 561.305121] ? find_held_lock+0x35/0x130 [ 561.309212] netlink_rcv_skb+0x17d/0x460 [ 561.313299] ? rtnetlink_put_metrics+0x560/0x560 [ 561.318080] ? netlink_ack+0xb30/0xb30 [ 561.321998] ? netlink_deliver_tap+0x254/0xc20 [ 561.326609] rtnetlink_rcv+0x1d/0x30 [ 561.330350] netlink_unicast+0x53a/0x730 [ 561.334437] ? netlink_attachskb+0x770/0x770 [ 561.338874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.344442] netlink_sendmsg+0x8ae/0xd70 [ 561.348535] ? netlink_unicast+0x730/0x730 [ 561.352799] ? selinux_socket_sendmsg+0x36/0x40 [ 561.357486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:24:03 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000180)={{0x1, 0x0, 0x80, {0x2000, 0x0, 0x1}}, "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", "f382762e62f1061994dbe13e2dbf908146cb7d24706a28e157f7548cbb229495acae06c5eb090ce1420cbbe22342e3fefb3e9f9066f17d5ba69bf2ea922b5873771a8a4fd63a0e4923d52013d7dae8068846e75d09489c0e7490ab842a7b2105eadc9e1e2c25a2a316e9f498900db7a70ce382d7f282594f7ce48d3319f6a39a2c3fac6d7fb02d26cb703323190852f64d0621ea2a198c67fcec7ec4dc236b7ee243e0574b21b24db617c63327dd2b0c39ca39af1af0af1c9e1a30d38fc768e97b8db0597d92dc9a7b96bd0dc25fcbb28e41aa826b230e9fdb6e6151cb3d273a22d67b7cd52a3a84ab23809d0a61076c232e912409bca13b5167aca90eba81866c7bd9698f1604473213e4a4762b3771d1b8b433f6cef4202fde9c24d7d0442ba06c47a2c90fe07ca345b4fa33294ae2357d2430e3ac573090f29d74d02c267b6a985c4ad9c18c743935d4bb582847f04fb14b0b8a7b56b914bbccae427488ce9f236c2fea5f9c262bfc523333d6160bbdc4ed8da56df53405ead0b29be5671e56fb5b3a57be410e1ecfcabf639b7e3223dce1d1324a34a21338a827b1f4e87dde2049e4410eaed656a78d232e314ee8a26040618889b03d21f0566f2a4ec384c565ef9434a1e9d66b7b3a3cce648178db1e8f80a443323eadbaaf28e048f5abed0f7264b280f5ff7fd33cc9249133b3aa53b7786e50d830df003630cb23a567a20f55577d2b769824d7fa3840e914a72e157570c97e964a9a570f5025f18d05e69dfb6762aa5de0092d70351c7de93dcd2ef8ee0088aeab07bbd6d05593338fdc8198ba5aee308f0864da653b0c0d25d88bc67a04d66e05de71512e26d16b3b72c5e0adfc9094eb94f6faf96dd3f6ce991d48dd9a1340f41e7f880e56c76cc3b9c38ad997b24f3840c1ccf3f47ee3635df68cc22cd419e7a910ba5debbc0ff54cad2bb80c41945778344b800199fa70c3c67e522dde1d2366012bb79e4f3638c5407f6c862b2dc6261688e67ce2f6d068483de2168ef165bbf9af543271feadb8878c0f31d26afdaee1ddc830333e42b20ffa9c7e3ee7f1ecfe9718ed900f15f78baa039a209e8e48a5345e0ef62fde32dcbe6f482d4814b354aa8affa9d39035de6ef203a61811e05865d1b0f0a31c469120668a7149384e6b7f3c7343b80c1349aacd183a0d5acf8858e1325d0057be6da6a277fb2a81f6b50ee81fbd927aa0b1f45691081da018c315c7595d433df326f8d67cf1b0c4ca311ad1cab2fe963be1c011ec7b90e439d37abb38a1aaa140ddf46e86efe2df2add369d201af94efcb9416683b848531d7dcc128633ac5ea797b9b63462faa81344e28df489689a9430f568b1ca04481fb9355e8eb55af3fdb3ce24d97c5f33b0f7c823cce4004dccc38294a0589c0f3586b913f0b0a3228a9a59bf5965757e3657088ebc18b11d63fbf43bab2c143e987a22c54a3b78b17637ec338d4a5ebf7f9f145fadd27bf5442270f3103104b390ee9079ee8021aeafc45e123635e4c6cc8f804619a59b912bb8f5d2e78071c90c8b35a4cda6f76260cbc2181ef16bec5a05b92304d7c5a26613c523cded944e59f1ed4ed23465c08f1622bed42752b8f827133bb8e66229dbee8e5b81d9d1baf23a67364fb3efccc434cfc0999b26989f10a3d04f6b308623d9984e5cb67eeb43054372a92d40d2d9c233453cf2bd27c46fabf2e3f26e1e248745b547c84d8f9e0e3e5060ea5802b8dc0e907cf2be23c8a8c88c26fb7814b7878c65d728b4a0f47deabca2af475d435985ae69ba40451fefe4a5cfffa6f0d0b6526500edbdedb281d70928b78975e3e14d211ac8507b40c431c01580743ef2f6a4735fba1185d508869141a3a3e33d810487810197bfad4042c3ebec2eda363bd390e5a03392a7a958b07958e74ea026557310ce715dc8a3a42234dcbcefed0bcf5c39bd80b3928f64c81a34b6f77e25830d51160247a3047bedf7a5c59a9efd092664ec3833105ef9c42b5c03a9bafb5518ccca1220257176da7a07c003166e02e8fba6f5f520f8f1d52d4fc3eff4c97c104a863774a051ed632f3ba7e083ce19c44e5a93d6eada360450273061451c5ec2a7f88c18c1b8e008025f8094e479eefb0b0dd7f8f64263002dd09db9f1abf51254ba08df7e2b1b0ad69bfd441785bf0967b10e5dc3ec016ad87b5d4d88896c86c7fb96d132950ecb9390521ea5d94affeb1f1170357622c075707471f1c11b7defbfeec27c9d2c527542f070a6bf16a4df1e11cc46675332748f0eb8748ffa2df65a1e69e9af3815c92b764a49946200a0250d0ad7ea69ee5dad8e3226da3e5ca7977c0053a6ee119b9529fa19ee19933f55ca9336347d696e1953745efd103f5b48b304c391a41369c7ed2f62b0cd3c993e941eab5a154480726a20cfd88720d9679350fbda1cf5acf3f22902b9ed4afddfd590658ea0c09894fc37f7a68cedeca1128bfdfe16efebb2500b50d378df9c78b27e5328ef2fbcf22c45c9b43a889631a577089913b36c5e57c1938afa52c8d3a54ce4c19dc438176ed7064acafbfb24d9d3cc6edee55d469a81d5cd3eb34f158a34df70e66fb6ec930afbb469c6f1aa42d918fe0249bced842cf97e26f2a6a45fe340675ace02bd9f34c92c6d7f5f1f6331bb2a0c22321a7fde6ec7f4fb1bb347d1ebc1b960cd53a0592c97b67cc9f1a14dce09aa7f6fd1eb8129cb4d9e16b91d5208d9372fb53e78677c1e759a95d61577d378f768569cf389b0328ef5df8fdb5aae1b411e6b51158e55b724de0b0b9b5dc24f7d4a203c61582b9e34c1de5a1b25df5fa2372963ea704e86c73e6000277895e17b98655d2f9b3400ccf1da25d423eaf6c2414bef5c0b07a6ec45aaae98d8f0ca026a367cf642b4cb9c352f8c27c66ffa6e41022f4e4b8b0f9a45d80047469ed225cd00e0f8f1a61f0f19558ffac3ae03732e0c8da7df9e3490e5acdc2e4cedbf79e8cf37807784e9af74d3c9a2391b7cfe301a59a776d7ee907bacaf83dd0e5b72316a0001b7ba8836d5316d7d261dbd95e49e8f680768db4ebcf6b1857966f98d4cf11f7146327697a29bda61d6c3f1ca20efe343dc4244483d5d057c99f0342cad71a6af1f2693c355b8a6a25bde27ab6bf765556819aa5f844ffef9c50ae6310b49e19c5f22b7b8c404181573472c3ddaf7af6f88326afadc585a5a6eccce703dcc535e045f671906942a945dac124ae9b1b9d18d99453f273a8d2998b48e092c08391ebebbd5e385833fcd4333060e83dca19dc51a3bec769cc2dd23a08cf01b34f559510578599824ad91add43e92bd62fc17ef97320dfcba681af8c1c4f35fe15d98f8b217142c5e5f5b8174ddee35dbfb7d492bbe7146a67940abd22f2f6b8f711a3a00d240594e52fb689fac1faa48d8d80802848432f90a404a95fca3f22a38113ed5a68f9dd181e564ea4c694338842a6dfa9c3d894cdeb37ad5c63b860d73103c5b6936efe2bde8bc004b032f6a11da784c941222741cd75e86eb4add867744c3300ea57a3897cfe486c447fe5fea3bc8f7d83382b6a566e47df2abacace23098538008119575ad624804fd267c45bada22d502afdda9a168d5a47ba186a54382c0273b1fb715e8d8b3f6ad757d1ec77476dfb3ee901e9c9093b0502fc03df9c8644ffccad1b7e7bc8242c31a7e1e66a8d7cdb7b9994b26268e4fd6f81a91984cef6324e7218f8b05ef84053e4e3d689f9e9e5cbedaf7374c4b774725b1d13d3114c8f4a0d3ce3fafa54170329bddbca5499b17195a9698993bc579208b40ca7e28129ed9c1f4ceef4d092bb07fd218af72658c3b7a00cdd3246335397bb9fcae56aa111152ee17cff6d4f656e0b5e9e72bece5e39f669bf618727c6e2f6bc8940183694490f243f51c1bcfe96cee7eac9f7eca9c2bbd1136de1310391ed1306e3f8e7bcf5c177c2ad647129a90efbf73dd9cbe6616120f9e9774b16fcc2b65e16ee62abb557f05808f810f7306db0e5c2c1fab8b1eb1dbf2bfe502f7571a7eea2b2ea4b807a692e4bcd18b48de30c62c335e2b55252b26b48af380906ddc23c50ff1d34be32da8d239d93988b1ec1f31922f8b5e754a274093f9b00e786dfc24758124dffea83b6b5259fa24c64f97586d013f9163b0f1df3c965ca427f42ec21ea2343cc7ec436cd8cd82db1da32f62b1350e5842dced90b340680c0e18cbcac68691eb9ad58142b013981135f802286dc8f0b88a9299eafe263f86c7faefeaba6c4533359ace3aa3381dc4460773ca1985b5634fd13cd9f1bf0efa217e2d53532e1b9c1d1122fb83485749be483e2a0a7c17c7ad109251f011cd200ea02b1adc138ca023ffcf10e99ba31b81a6a4b27680089fd82dde8c6bd95e96ea4b9f3e6ad29ae322ed9561b607e361e192e275c35fb05a5d6e8a0fd7687e372a0ec919ac3c70c1cbd28e6eb88819fcd528b7469a12a0b1f585957e77b47ac02ef46edf58cd4f43745d23db36416e2d2d40e172042870b4fe9a38ce1ba388bb61c018fba76acb10484b6c7422ffb0dbc28d9c058fd55bcd87ed12d2bcafc69c6db5ef1fc5d51d2fe8cee1dc14b87fb74a76b8696923456ce2d221ccb9f8384ae3732917f06169c386ca423f2b6e59da6384a03986d285a0cace3409ff1c58a90510869bdcb75f77581dc08ae21c708dcd3a2d9fb9e069959cebe5465eb981d202baf794d51b8e69b6c5e08926e767add6f8885607c1f72b06bef5e7826509d3864a3ba535e0c599911b22faa73bc2cb8568f73ebc346fc6a133247374c7400232110022033e2f0d72da986056ea020e26ea82a6b66ba387d3db7126e369f8e5283b09252cc5cef630fa0625ff8727819c3c519bfe04586df44f4fe2c03938c647ab2a0da0a8e1785a907ff59fa7eb66eb28ec4b5ad3bff03c6ffff767a2901eb8e653acf663213ffb30c04babf63877898ce7814f5133927a0f0e75d5c4c7f825469b2deb8d0243151d3d7426b41cff997acb971830f2cc7378a97ed5881281cf9246bfdbba0e4c8c0d3b0dd782f8754c357237d0eb10a15346ad73cb4b297ea59804f4264bcb046b1d2d965af7cab6cb05e2645dc5d418fb4fafdeb0656e2fa8c5e343c24cf52cc6d5f9981fa02a4fdbfa15552beb43146acdf413bab536e449b2bc4b6cd8d18cd8c32ea7bccc11fe4b713c0b9e1a05dd1d052c8972240b11af52055eb9420cc686a3eb5ac186857a8ccced80a63564a6230f8672fe5e1d12cc3b7abb6e99e77a5a8ab006e9a49a19582a20ed6d51033fe6e5a0575d1dde1675b4419988cb948bc3caddb880819e65466f2ceebe971416c491af370026b7666cf86b3f4e9e95a8ef9deb45b644f2f43807b99f565c4201de4dec5918af6f7ebfb1767201e4413b18e0eccb7e8563d50f6b98d595378896399fe0f7bd9d1f652b3b55380ced1af96f3522c12c4b0374f55d026e176bb8aed68ceae68e9342ad29f51dd3c5c6895ae33d8fda4d0940d1b449ff691548edbffafadff9b577492f606195f20d8a629c322a58d7302b43031e7752762bd66e6d78bd0a8d603d9f14b8420611272d83bba2fd8e5271dad2e10938a90c20b06d13857c8a6dc0ca5a0cc4c87222606ccef6c1450a2eadc12aa27ac47a37f0dd5f89ae7ffd25ce29a7cd2a594d242c9c5e75197f45f641602c0501f75bf7042b52686634f0c0217967c6a1509559b48c8d4511cab6afbe28a753a3bd936a43a70b89f73f80ac7eee0a3aa06214594737d49c915d428c0103155ba6acfdd145c1d47daa17d8546e0ea41bbc62178f"}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 561.363047] ? security_socket_sendmsg+0x8d/0xc0 [ 561.367834] ? netlink_unicast+0x730/0x730 [ 561.372102] sock_sendmsg+0xd7/0x130 [ 561.375840] ___sys_sendmsg+0x803/0x920 [ 561.379841] ? copy_msghdr_from_user+0x430/0x430 [ 561.384631] ? lock_downgrade+0x880/0x880 [ 561.388804] ? kasan_check_read+0x11/0x20 [ 561.392971] ? __fget+0x367/0x540 [ 561.396434] ? iterate_fd+0x360/0x360 [ 561.400265] ? __fget_light+0x1a9/0x230 [ 561.404263] ? __fdget+0x1b/0x20 [ 561.407644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.413195] __sys_sendmsg+0x105/0x1d0 [ 561.417104] ? __ia32_sys_shutdown+0x80/0x80 [ 561.421557] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.426340] ? do_syscall_64+0x26/0x620 [ 561.430330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.435714] ? do_syscall_64+0x26/0x620 [ 561.439713] __x64_sys_sendmsg+0x78/0xb0 [ 561.443803] do_syscall_64+0xfd/0x620 [ 561.447633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.452839] RIP: 0033:0x45af49 [ 561.456048] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.474979] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 561.482721] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 561.490014] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 561.497329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 561.504618] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 20:24:04 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) [ 561.511901] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 [ 561.519722] kauditd_printk_skb: 6 callbacks suppressed [ 561.519741] audit: type=1804 audit(1578601443.546:451): pid=26367 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/659/bus" dev="sda1" ino=16789 res=1 20:24:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eca00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 561.573571] device macvtap496 entered promiscuous mode [ 561.586175] audit: type=1804 audit(1578601443.546:452): pid=26368 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/659/bus" dev="sda1" ino=16789 res=1 [ 561.632367] device macvtap162 entered promiscuous mode 20:24:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffffc300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:04 executing program 2 (fault-call:1 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 561.656858] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0749ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 561.739723] device macvtap461 entered promiscuous mode [ 561.745153] audit: type=1804 audit(1578601443.546:453): pid=26373 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/660/bus" dev="sda1" ino=16789 res=1 [ 561.783269] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 561.806780] FAULT_INJECTION: forcing a failure. [ 561.806780] name failslab, interval 1, probability 0, space 0, times 0 [ 561.836432] audit: type=1804 audit(1578601443.546:454): pid=26374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/660/bus" dev="sda1" ino=16789 res=1 [ 561.843575] CPU: 0 PID: 26386 Comm: syz-executor.2 Not tainted 4.19.94-syzkaller #0 [ 561.871022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.871411] audit: type=1804 audit(1578601444.156:455): pid=26380 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/661/bus" dev="sda1" ino=16792 res=1 [ 561.880376] Call Trace: [ 561.880403] dump_stack+0x197/0x210 [ 561.880426] should_fail.cold+0xa/0x1b [ 561.880446] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 561.880463] ? lock_downgrade+0x880/0x880 [ 561.880489] __should_failslab+0x121/0x190 [ 561.930931] should_failslab+0x9/0x14 [ 561.935089] kmem_cache_alloc_node_trace+0x274/0x720 [ 561.940195] ? __lockdep_init_map+0x10c/0x5b0 [ 561.944752] __kmalloc_node+0x3d/0x80 [ 561.948556] kvmalloc_node+0x68/0x100 [ 561.952367] alloc_netdev_mqs+0x88a/0xdb0 [ 561.956550] rtnl_create_link+0x1dd/0xa00 [ 561.960708] ? netlink_ns_capable+0x26/0x30 [ 561.965035] rtnl_newlink+0xf3f/0x1600 [ 561.968951] ? rtnl_link_unregister+0x250/0x250 [ 561.973632] ? __lock_acquire+0x6ee/0x49c0 [ 561.978046] ? cpuacct_charge+0x1db/0x360 [ 561.982197] ? __lock_is_held+0xb6/0x140 [ 561.986264] ? mark_held_locks+0x100/0x100 [ 561.990515] ? finish_task_switch+0x146/0x7c0 [ 561.995021] ? __lock_acquire+0x6ee/0x49c0 [ 561.999269] ? finish_task_switch+0x146/0x7c0 [ 562.003764] ? mark_held_locks+0xb1/0x100 [ 562.007912] ? mark_held_locks+0x100/0x100 [ 562.012160] ? kasan_check_write+0x14/0x20 [ 562.016400] ? finish_task_switch+0x1db/0x7c0 [ 562.020889] ? switch_mm_irqs_off+0x7fa/0x1360 [ 562.025482] ? __mutex_lock+0xa67/0x1300 [ 562.029561] ? find_held_lock+0x35/0x130 [ 562.033667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.039218] ? rtnl_link_unregister+0x250/0x250 [ 562.043904] rtnetlink_rcv_msg+0x463/0xb00 [ 562.048209] ? rtnetlink_put_metrics+0x560/0x560 [ 562.052986] ? netdev_pick_tx+0x300/0x300 [ 562.057147] ? netlink_deliver_tap+0x22d/0xc20 [ 562.061727] ? find_held_lock+0x35/0x130 [ 562.065797] netlink_rcv_skb+0x17d/0x460 [ 562.069862] ? rtnetlink_put_metrics+0x560/0x560 [ 562.074721] ? netlink_ack+0xb30/0xb30 [ 562.078625] ? kasan_check_read+0x11/0x20 [ 562.082946] ? netlink_deliver_tap+0x254/0xc20 [ 562.087531] rtnetlink_rcv+0x1d/0x30 [ 562.091245] netlink_unicast+0x53a/0x730 [ 562.095490] ? netlink_attachskb+0x770/0x770 [ 562.099916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.105451] netlink_sendmsg+0x8ae/0xd70 [ 562.109541] ? netlink_unicast+0x730/0x730 [ 562.113771] ? selinux_socket_sendmsg+0x36/0x40 [ 562.118430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.123980] ? security_socket_sendmsg+0x8d/0xc0 [ 562.128757] ? netlink_unicast+0x730/0x730 [ 562.132995] sock_sendmsg+0xd7/0x130 [ 562.136709] ___sys_sendmsg+0x803/0x920 [ 562.140676] ? copy_msghdr_from_user+0x430/0x430 [ 562.145429] ? lock_downgrade+0x880/0x880 [ 562.149599] ? kasan_check_read+0x11/0x20 [ 562.153745] ? __fget+0x367/0x540 [ 562.157207] ? iterate_fd+0x360/0x360 [ 562.161006] ? __fget_light+0x1a9/0x230 [ 562.164992] ? __fdget+0x1b/0x20 [ 562.168356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.173887] __sys_sendmsg+0x105/0x1d0 [ 562.177768] ? __ia32_sys_shutdown+0x80/0x80 [ 562.182182] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 562.186933] ? do_syscall_64+0x26/0x620 [ 562.190927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.196288] ? do_syscall_64+0x26/0x620 [ 562.200275] __x64_sys_sendmsg+0x78/0xb0 [ 562.204332] do_syscall_64+0xfd/0x620 [ 562.208825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.214004] RIP: 0033:0x45af49 [ 562.217188] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:24:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900680000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ecb00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 562.236079] RSP: 002b:00007fd541af0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 562.243953] RAX: ffffffffffffffda RBX: 00007fd541af0c90 RCX: 000000000045af49 [ 562.251232] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 562.258492] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 562.265754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd541af16d4 [ 562.273015] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000004 [ 562.329845] device macvtap497 entered promiscuous mode 20:24:04 executing program 2 (fault-call:1 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 562.365368] device macvtap163 entered promiscuous mode 20:24:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffffe400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074aec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 562.419450] device macvtap462 entered promiscuous mode [ 562.437387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ecc00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09006c0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 562.577308] audit: type=1804 audit(1578601445.016:456): pid=26407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/661/bus" dev="sda1" ino=16792 res=1 [ 562.583813] device macvtap498 entered promiscuous mode [ 562.693675] audit: type=1800 audit(1578601445.046:457): pid=26380 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16792 res=0 20:24:05 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$TIOCCBRK(r0, 0x5428) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000003ee00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 562.745333] device macvtap164 entered promiscuous mode 20:24:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 562.790083] audit: type=1800 audit(1578601445.066:458): pid=26407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16792 res=0 [ 562.878197] device macvtap463 entered promiscuous mode [ 562.908147] device macvtap499 entered promiscuous mode [ 562.926886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074bec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000fffffff000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 562.966119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 562.987640] audit: type=1804 audit(1578601445.346:459): pid=26424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/662/bus" dev="sda1" ino=16806 res=1 20:24:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ecd00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900740000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 563.114362] audit: type=1804 audit(1578601445.506:460): pid=26431 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/662/bus" dev="sda1" ino=16806 res=1 [ 563.147928] device macvtap165 entered promiscuous mode 20:24:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074cec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.240402] device macvtap500 entered promiscuous mode 20:24:05 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e22, 0x6, @loopback, 0x5}, r4}}, 0x38) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 563.323451] device macvtap464 entered promiscuous mode 20:24:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000003f400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.377108] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ece00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.425933] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 563.517102] device macvtap11 entered promiscuous mode 20:24:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09007a0000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 563.576338] device macvtap166 entered promiscuous mode [ 563.641147] device macvtap501 entered promiscuous mode 20:24:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074dec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.722252] device macvtap465 entered promiscuous mode 20:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf403, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.773683] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000003f600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.834663] device macvtap167 entered promiscuous mode 20:24:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ecf00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 563.876023] device macvtap12 entered promiscuous mode 20:24:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074eec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900f00000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf408, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 564.028493] device macvtap502 entered promiscuous mode [ 564.093248] device macvtap466 entered promiscuous mode 20:24:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000fffffffc00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 564.152419] device macvtap168 entered promiscuous mode [ 564.198696] device macvtap13 entered promiscuous mode [ 564.289676] device macvtap503 entered promiscuous mode 20:24:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900a00100000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000000000fffe00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf409, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d074fec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:06 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @rand_addr="15bab8720f7b6deacd1d55502500fca9"}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e1f, 0x0, @remote}, 0xfffffffffffffdb4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000003, 0xfc) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r7, r0, &(0x7f0000000000)=0x3ff, 0x619) sendfile(r4, r7, 0x0, 0x80001d00c0d0) kcmp(0x0, r6, 0x0, r4, r5) ppoll(&(0x7f0000000140)=[{}, {r4}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 564.534981] device macvtap467 entered promiscuous mode [ 564.574214] device macvtap169 entered promiscuous mode 20:24:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 564.636815] device macvtap14 entered promiscuous mode 20:24:07 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendto$llc(r2, &(0x7f0000000180)="ddff4510e73925cdcd9aac502c6563cd1bfea14bbfe992e719edece3b6410e8fff75da3471ab87608fc2353f2af215651cac190964dcee8bbe224d72fddef2424adce8087cd5efd796f5dd49a5a321c48b8bdd15d934f26fc589a632836b3edac48d049c21f98d9962c15f91e5f368e9d8505c414ff76d507d5dfa515da92b65f21fef94818a5abee2b796e3e62cc772062bc8c9e22307becc5193ca2605ab5f", 0xa0, 0x4000000, &(0x7f0000000000)={0x1a, 0x2aa, 0x2, 0x81, 0x7f, 0x1f}, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) fchown(0xffffffffffffffff, r5, 0xee00) close(r3) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r7, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0750ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf40a, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 564.685445] device macvtap504 entered promiscuous mode [ 564.697538] nla_parse: 1 callbacks suppressed [ 564.697550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000fffffffe00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900410200000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 564.885477] device macvtap170 entered promiscuous mode 20:24:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0751ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 564.950774] device macvtap468 entered promiscuous mode [ 564.975633] device macvtap15 entered promiscuous mode [ 565.025582] device macvtap505 entered promiscuous mode 20:24:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf410, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.055418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000000fff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000300000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 565.152518] device macvtap171 entered promiscuous mode [ 565.167200] validate_nla: 34 callbacks suppressed [ 565.167210] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 20:24:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0752ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.241195] device macvtap16 entered promiscuous mode [ 565.273055] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf414, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.324413] device macvtap469 entered promiscuous mode [ 565.337892] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:07 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @multicast2}], 0x20) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {0xffffffffffffffff, 0x4103}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 565.397188] device macvtap506 entered promiscuous mode 20:24:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000001fffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.425352] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 565.475816] device macvtap172 entered promiscuous mode 20:24:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0753ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.498341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 565.533703] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 20:24:08 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="82654fbe7f00c7a4f45ede769b1600", 0xfffffffe}, 0xfffffffffffffeb8) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x7ff, 0xe6, 0x9, 0xffff0000}]}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) [ 565.572561] device macvtap17 entered promiscuous mode [ 565.617620] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf463, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000000)={0x3f, 0x6, 0x4, 0x4, 0x5, {0x77359400}, {0x5, 0xc, 0x24, 0xb, 0x1, 0xff, "e33d33ce"}, 0x3, 0x1, @fd=r6, 0x1000, 0x0, r0}) fsetxattr$security_evm(r7, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "e114ed221e225dcb46087b789d6ab484da3de389"}, 0x15, 0x2) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 565.662831] device macvtap470 entered promiscuous mode [ 565.704238] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.751586] device macvtap507 entered promiscuous mode 20:24:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000500000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 565.785606] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:24:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000000007fffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.843713] device macvtap173 entered promiscuous mode [ 565.867492] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 20:24:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0754ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 565.946406] device macvtap18 entered promiscuous mode [ 565.958028] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 566.018265] device macvtap471 entered promiscuous mode 20:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0900000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.052932] device macvtap508 entered promiscuous mode [ 566.062797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 566.091282] device macvtap174 entered promiscuous mode 20:24:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.142793] device macvtap472 entered promiscuous mode 20:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0f00000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0755ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000600000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.287438] device macvtap509 entered promiscuous mode [ 566.343997] device macvtap175 entered promiscuous mode [ 566.363917] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 566.453702] device macvtap473 entered promiscuous mode 20:24:08 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000000)) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa7}], 0x3, 0x0, 0x0, 0x0) 20:24:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000a087ffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0756ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="1000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000700000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000001d600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.588361] device macvtap510 entered promiscuous mode 20:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2500000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.642399] device macvtap176 entered promiscuous mode 20:24:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0757ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.666797] kauditd_printk_skb: 14 callbacks suppressed [ 566.666813] audit: type=1804 audit(1578601449.096:475): pid=26626 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/669/bus" dev="sda1" ino=16625 res=1 20:24:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d008000a0ffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 566.729020] device macvtap474 entered promiscuous mode [ 566.741127] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 20:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c00000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000f00000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 566.829364] audit: type=1804 audit(1578601449.266:476): pid=26636 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/669/bus" dev="sda1" ino=16625 res=1 20:24:09 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) dup3(r4, r2, 0x80000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x80001d00c0d0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r9) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 566.941114] device macvtap177 entered promiscuous mode [ 566.973938] device macvtap511 entered promiscuous mode 20:24:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0758ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="c000000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000001a0ffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 567.029102] device macvtap475 entered promiscuous mode [ 567.054476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 567.137718] audit: type=1804 audit(1578601449.576:477): pid=26660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/670/bus" dev="sda1" ino=16863 res=1 [ 567.159092] device macvtap476 entered promiscuous mode 20:24:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900002000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 567.197832] device macvtap178 entered promiscuous mode 20:24:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="c00e000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 567.230396] device macvtap512 entered promiscuous mode [ 567.233480] audit: type=1804 audit(1578601449.646:478): pid=26663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/670/bus" dev="sda1" ino=16863 res=1 20:24:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0759ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00f0ffffffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="e03f030010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 567.345958] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 567.463439] device macvtap477 entered promiscuous mode 20:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="ffff0f0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 567.509613] device macvtap179 entered promiscuous mode 20:24:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900002800000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 567.564888] device macvtap513 entered promiscuous mode [ 567.665755] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075aec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4002002010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0dffffffffffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900003f00000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:10 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000180)={0x8a81, {{0x2, 0x4e21, @broadcast}}}, 0x88) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000000b00850600000000000070d28b94d3784a1e041ec66ed154dc6e57c900000000", @ANYRES32=r7, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r7}]]}}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', r7}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in=@multicast2, 0x4, 0x1e11, 0x4e22, 0xff, 0xa, 0x0, 0xa0, 0x2, r7, r9}, {0x3, 0x3, 0x6, 0x80000001, 0x3, 0x2, 0xfffffffffffffff9, 0x9}, {0x7f, 0x0, 0x9, 0x9}, 0x2, 0x6e6bbc, 0x0, 0x1, 0x2}, {{@in6=@mcast2, 0x4d6, 0xa0}, 0x2, @in6=@local, 0x3503, 0x4, 0x2, 0x0, 0x8000, 0x3, 0x10001}}, 0xe8) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="00f0ff7f10005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 567.885004] device macvtap478 entered promiscuous mode [ 567.897011] audit: type=1804 audit(1578601450.336:479): pid=26709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/671/bus" dev="sda1" ino=16866 res=1 20:24:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000001005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ed900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 567.952513] selinux_nlmsg_perm: 2 callbacks suppressed [ 567.952530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pig=26709 comm=syz-executor.3 [ 567.986978] device macvtap180 entered promiscuous mode 20:24:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075bec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 568.038517] device macvtap514 entered promiscuous mode [ 568.038785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=26717 comm=syz-executor.2 [ 568.056104] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900004000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 568.125453] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pig=26714 comm=syz-executor.3 20:24:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000002005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r3, 0x0, 0x31, &(0x7f0000000000)="c86e1f2b6b42aca15fea4fb6fbfb11db97ba9841f1867045ac9575a8f18715b8c9b943007d0b95803fa0dbff20984bbb14043031805f14643105d030d537152e5ecac91fef4767f8aecc6881afd71e61fe4226262df87e16e9", 0x59) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x8) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 568.199926] audit: type=1800 audit(1578601450.636:480): pid=26709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16866 res=0 [ 568.237646] device macvtap479 entered promiscuous mode [ 568.291187] device macvtap181 entered promiscuous mode 20:24:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eda00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075cec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 568.335203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pig=26736 comm=syz-executor.2 20:24:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000003005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 568.412267] audit: type=1804 audit(1578601450.836:481): pid=26739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/672/bus" dev="sda1" ino=16577 res=1 [ 568.418255] device macvtap515 entered promiscuous mode 20:24:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900024100000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 568.490389] device macvtap480 entered promiscuous mode [ 568.523311] device macvtap182 entered promiscuous mode 20:24:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000300"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075dec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022edb00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 568.578565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=26748 comm=syz-executor.2 20:24:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000004005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900004800000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 568.706204] device macvtap516 entered promiscuous mode 20:24:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022edc00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 568.771519] device macvtap481 entered promiscuous mode [ 568.777512] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=26766 comm=syz-executor.2 [ 568.802431] device macvtap183 entered promiscuous mode [ 568.963619] device macvtap482 entered promiscuous mode [ 568.989871] device macvtap517 entered promiscuous mode 20:24:11 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000180)=""/134) close(r1) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2e}}], 0x3f4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x88000, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r9, 0x200004) sendfile(r6, r9, 0x0, 0x80001d00c0d0) kcmp(0x0, r8, 0x0, r6, r7) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000000c0)=0x1e) 20:24:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900004c00000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075eec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000005005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022edd00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000500"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 569.181758] audit: type=1804 audit(1578601451.616:482): pid=26780 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/672/bus" dev="sda1" ino=16577 res=1 [ 569.276029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=26785 comm=syz-executor.2 [ 569.311480] device macvtap518 entered promiscuous mode 20:24:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000006005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 569.360464] device macvtap184 entered promiscuous mode 20:24:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900006000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000600"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 569.400885] audit: type=1804 audit(1578601451.836:483): pid=26796 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/673/bus" dev="sda1" ino=16869 res=1 [ 569.471421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pig=26802 comm=syz-executor.2 20:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000007005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d075fec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 569.521502] device macvtap483 entered promiscuous mode [ 569.530444] audit: type=1804 audit(1578601451.936:484): pid=26800 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/673/bus" dev="sda1" ino=16869 res=1 [ 569.609946] device macvtap519 entered promiscuous mode [ 569.626802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pig=26812 comm=syz-executor.2 [ 569.654694] device macvtap185 entered promiscuous mode 20:24:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ede00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 569.814518] device macvtap484 entered promiscuous mode 20:24:12 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) lseek(r6, 0x100, 0x2) 20:24:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0760ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000008005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000700"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900006800000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022edf00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000009005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 570.180457] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=26831 comm=syz-executor.2 [ 570.258660] device macvtap520 entered promiscuous mode [ 570.273553] validate_nla: 38 callbacks suppressed [ 570.273563] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000000a005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 570.309512] device macvtap186 entered promiscuous mode [ 570.321511] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0761ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 570.420936] device macvtap485 entered promiscuous mode 20:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000000b005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000001e000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 570.446670] nla_parse: 5 callbacks suppressed [ 570.446681] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 570.470071] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 570.530782] device macvtap521 entered promiscuous mode [ 570.553570] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 570.592567] device macvtap187 entered promiscuous mode [ 570.617060] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 570.706051] device macvtap486 entered promiscuous mode 20:24:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000c00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000000c005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0762ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900006c00000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x5, @local}], 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) fcntl$dupfd(r4, 0x0, r7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r3, r8, 0x0, 0x80001d00c0d0) kcmp(0x0, r5, 0x0, r3, r4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x2c, @local, 0x4e23, 0x0, 'wrr\x00', 0xc, 0x6, 0x23}, {@loopback, 0x4e21, 0x2000, 0x0, 0x2}}, 0x44) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 570.780180] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000000d005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 570.840113] device macvtap522 entered promiscuous mode [ 570.872696] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000f00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 570.913309] device macvtap487 entered promiscuous mode [ 570.923265] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 570.979390] device macvtap188 entered promiscuous mode 20:24:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0763ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000000e005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.001108] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 571.027035] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 571.104866] device macvtap523 entered promiscuous mode 20:24:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900007400000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 571.127080] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d001200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.181388] device macvtap488 entered promiscuous mode [ 571.220927] device macvtap189 entered promiscuous mode 20:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000000f005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.251806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0764ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.341541] device macvtap524 entered promiscuous mode 20:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4002000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.381846] device macvtap489 entered promiscuous mode [ 571.420508] device macvtap190 entered promiscuous mode 20:24:14 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000000)=""/33) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d004800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900007a00000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4003000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0765ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4004000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.752382] device macvtap191 entered promiscuous mode [ 571.799729] device macvtap490 entered promiscuous mode 20:24:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0766ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.839722] device macvtap525 entered promiscuous mode 20:24:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 571.866889] kauditd_printk_skb: 3 callbacks suppressed [ 571.866908] audit: type=1804 audit(1578601454.296:488): pid=26934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/676/bus" dev="sda1" ino=16872 res=1 [ 571.884436] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d004a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4005000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.003069] device macvtap192 entered promiscuous mode 20:24:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900008100000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 572.065957] device macvtap526 entered promiscuous mode [ 572.120447] device macvtap491 entered promiscuous mode [ 572.128021] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d004c00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0767ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4006000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000ffffffe400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c090000f000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 572.340513] audit: type=1804 audit(1578601454.776:489): pid=26934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/676/bus" dev="sda1" ino=16872 res=1 20:24:14 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x2, 0x84) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) ftruncate(r8, 0x200004) sendfile(r5, r8, 0x0, 0x80001d00c0d0) kcmp(0x0, r7, 0x0, r5, r6) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, 0x0, 0x0) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) splice(r10, &(0x7f0000000000)=0x1, r6, &(0x7f0000000040)=0x7, 0x1, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r11, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r1, 0xa9}], 0x3, 0x0, 0x0, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, 0x0, 0x0) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) ioctl$VT_DISALLOCATE(r13, 0x5608) 20:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4007000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.449856] device macvtap193 entered promiscuous mode [ 572.494154] device macvtap492 entered promiscuous mode 20:24:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0768ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.545001] device macvtap527 entered promiscuous mode 20:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4009000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.596448] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d006000"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900004003000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 572.721636] device macvtap194 entered promiscuous mode 20:24:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0769ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.768400] audit: type=1804 audit(1578601455.206:490): pid=26982 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/677/bus" dev="sda1" ino=16874 res=1 [ 572.839213] device macvtap493 entered promiscuous mode 20:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400a000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.867398] device macvtap528 entered promiscuous mode [ 572.881492] device macvtap195 entered promiscuous mode [ 572.896290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d006800"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076aec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 572.914613] audit: type=1804 audit(1578601455.346:491): pid=26997 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/677/bus" dev="sda1" ino=16874 res=1 [ 572.948890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 573.069265] device macvtap529 entered promiscuous mode [ 573.115266] device macvtap196 entered promiscuous mode [ 573.164071] device macvtap494 entered promiscuous mode 20:24:15 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = getpid() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) kcmp(0x0, r2, 0x0, r0, r1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)=0xfffffffc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @multicast2}], 0x10) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, 0x0, 0x0) ftruncate(r7, 0x200004) sendfile(r4, r7, 0x0, 0x80001d00c0d0) kcmp(0x0, r6, 0x0, r4, r5) ftruncate(0xffffffffffffffff, 0x2) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r8, r10, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r8, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d006c00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400c000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000340000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076bec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 573.348190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 573.371145] device macvtap197 entered promiscuous mode 20:24:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076cec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400e000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 573.410377] device macvtap495 entered promiscuous mode [ 573.462602] device macvtap530 entered promiscuous mode 20:24:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900a00080000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d007400"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 573.533933] device macvtap198 entered promiscuous mode 20:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4010000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 573.599302] audit: type=1804 audit(1578601456.036:492): pid=27033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/678/bus" dev="sda1" ino=16884 res=1 [ 573.668783] device macvtap496 entered promiscuous mode [ 573.683351] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 573.744688] device macvtap531 entered promiscuous mode 20:24:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022edb00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ee900000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076dec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4020000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d007a00"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900fffff0000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 574.243880] audit: type=1804 audit(1578601456.676:493): pid=27059 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir276878039/syzkaller.RGVQQR/678/bus" dev="sda1" ino=16884 res=1 [ 574.343930] device macvtap199 entered promiscuous mode 20:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4048000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076eec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 574.376446] device macvtap532 entered promiscuous mode [ 574.410177] device macvtap10 entered promiscuous mode 20:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="404a000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 574.461300] device macvtap497 entered promiscuous mode 20:24:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00f000"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 574.501125] device macvtap200 entered promiscuous mode 20:24:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000a087ffffffff00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000010012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 574.565421] device macvtap498 entered promiscuous mode 20:24:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d076fec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eea00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="404c000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 574.733466] device macvtap533 entered promiscuous mode 20:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4060000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d009601000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 574.756448] device macvtap11 entered promiscuous mode [ 574.810385] device macvtap201 entered promiscuous mode 20:24:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0770ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendto$llc(r2, &(0x7f0000000180)="ddff4510e73925cdcd9aac502c6563cd1bfea14bbfe992e719edece3b6410e8fff75da3471ab87608fc2353f2af215651cac190964dcee8bbe224d72fddef2424adce8087cd5efd796f5dd49a5a321c48b8bdd15d934f26fc589a632836b3edac48d049c21f98d9962c15f91e5f368e9d8505c414ff76d507d5dfa515da92b65f21fef94818a5abee2b796e3e62cc772062bc8c9e22307becc5193ca2605ab5f", 0xa0, 0x4000000, &(0x7f0000000000)={0x1a, 0x2aa, 0x2, 0x81, 0x7f, 0x1f}, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) fchown(0xffffffffffffffff, r5, 0xee00) close(r3) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r7, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) [ 574.872139] device macvtap499 entered promiscuous mode 20:24:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000020012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4068000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 574.944251] device macvtap534 entered promiscuous mode 20:24:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eeb00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00a001000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.066307] device macvtap202 entered promiscuous mode 20:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="406c000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000030012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0771ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.187622] device macvtap500 entered promiscuous mode 20:24:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eec00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.274105] device macvtap535 entered promiscuous mode 20:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4074000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.308969] validate_nla: 40 callbacks suppressed [ 575.308980] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:24:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000040012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 575.369600] device macvtap203 entered promiscuous mode 20:24:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d002002000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.413666] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 575.462536] device macvtap501 entered promiscuous mode [ 575.498367] nla_parse: 5 callbacks suppressed [ 575.498378] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 575.568935] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 575.601140] device macvtap536 entered promiscuous mode 20:24:18 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendto$llc(r2, &(0x7f0000000180)="ddff4510e73925cdcd9aac502c6563cd1bfea14bbfe992e719edece3b6410e8fff75da3471ab87608fc2353f2af215651cac190964dcee8bbe224d72fddef2424adce8087cd5efd796f5dd49a5a321c48b8bdd15d934f26fc589a632836b3edac48d049c21f98d9962c15f91e5f368e9d8505c414ff76d507d5dfa515da92b65f21fef94818a5abee2b796e3e62cc772062bc8c9e22307becc5193ca2605ab5f", 0xa0, 0x4000000, &(0x7f0000000000)={0x1a, 0x2aa, 0x2, 0x81, 0x7f, 0x1f}, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) fchown(0xffffffffffffffff, r5, 0xee00) close(r3) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r7, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0772ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="407a000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eed00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000050012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d002402000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.817447] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40f0000010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.861227] device macvtap502 entered promiscuous mode [ 575.890611] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:24:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40c0010010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.950054] device macvtap204 entered promiscuous mode 20:24:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eee00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 575.973215] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0773ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 576.027792] device macvtap537 entered promiscuous mode [ 576.043474] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40cc010010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d006c02000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 576.078510] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 576.156324] device macvtap503 entered promiscuous mode [ 576.177118] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 576.228992] device macvtap205 entered promiscuous mode [ 576.260772] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 576.308738] device macvtap538 entered promiscuous mode 20:24:19 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendto$llc(r2, &(0x7f0000000180)="ddff4510e73925cdcd9aac502c6563cd1bfea14bbfe992e719edece3b6410e8fff75da3471ab87608fc2353f2af215651cac190964dcee8bbe224d72fddef2424adce8087cd5efd796f5dd49a5a321c48b8bdd15d934f26fc589a632836b3edac48d049c21f98d9962c15f91e5f368e9d8505c414ff76d507d5dfa515da92b65f21fef94818a5abee2b796e3e62cc772062bc8c9e22307becc5193ca2605ab5f", 0xa0, 0x4000000, &(0x7f0000000000)={0x1a, 0x2aa, 0x2, 0x81, 0x7f, 0x1f}, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) fchown(0xffffffffffffffff, r5, 0xee00) close(r3) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r7, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000140)=[{}, {}, {r3, 0xa9}], 0x3, 0x0, 0x0, 0x0) 20:24:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022eef00000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000060012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40ea010010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0774ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00b002000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4034020010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 576.709543] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 576.768603] device macvtap206 entered promiscuous mode 20:24:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0775ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 576.811682] device macvtap539 entered promiscuous mode 20:24:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000030010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000003000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 576.866054] device macvtap504 entered promiscuous mode [ 576.902118] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000070012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 577.000632] device macvtap207 entered promiscuous mode [ 577.098925] device macvtap540 entered promiscuous mode [ 577.123469] device macvtap505 entered promiscuous mode [ 577.140150] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0775ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000050010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0776ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d004c03000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09000000000f0012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000fffffff000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4098050010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0777ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 577.643880] device macvtap208 entered promiscuous mode [ 577.691749] device macvtap506 entered promiscuous mode 20:24:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef100000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 577.739358] device macvtap541 entered promiscuous mode [ 577.750639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 577.786200] device macvtap12 entered promiscuous mode 20:24:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000060010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 3 (fault-call:6 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) [ 577.824039] device macvtap209 entered promiscuous mode [ 577.863893] device macvtap542 entered promiscuous mode 20:24:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0778ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000200012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00ee03000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 577.923316] device macvtap507 entered promiscuous mode [ 577.953249] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:24:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000070010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000003f200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 578.040946] FAULT_INJECTION: forcing a failure. [ 578.040946] name failslab, interval 1, probability 0, space 0, times 0 [ 578.070776] device macvtap210 entered promiscuous mode [ 578.085808] CPU: 1 PID: 27261 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 578.093652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.103017] Call Trace: [ 578.105634] dump_stack+0x197/0x210 [ 578.109295] should_fail.cold+0xa/0x1b [ 578.113209] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 578.118327] ? lock_downgrade+0x880/0x880 [ 578.118362] __should_failslab+0x121/0x190 [ 578.118387] should_failslab+0x9/0x14 [ 578.126757] kmem_cache_alloc_node+0x26c/0x710 [ 578.126789] __alloc_skb+0xd5/0x5f0 [ 578.126809] ? skb_trim+0x190/0x190 [ 578.126829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.126850] ? netlink_autobind.isra.0+0x228/0x310 [ 578.135223] netlink_sendmsg+0x97b/0xd70 [ 578.135251] ? netlink_unicast+0x730/0x730 [ 578.135278] ? selinux_socket_sendmsg+0x36/0x40 [ 578.142508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.142528] ? security_socket_sendmsg+0x8d/0xc0 [ 578.142547] ? netlink_unicast+0x730/0x730 [ 578.142569] sock_sendmsg+0xd7/0x130 [ 578.153025] ___sys_sendmsg+0x803/0x920 [ 578.153050] ? copy_msghdr_from_user+0x430/0x430 [ 578.153081] ? lock_downgrade+0x880/0x880 [ 578.161366] ? kasan_check_read+0x11/0x20 [ 578.161391] ? __fget+0x367/0x540 [ 578.161411] ? iterate_fd+0x360/0x360 [ 578.161437] ? __fget_light+0x1a9/0x230 [ 578.171608] ? __fdget+0x1b/0x20 [ 578.171627] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 578.171649] __sys_sendmsg+0x105/0x1d0 [ 578.171667] ? __ia32_sys_shutdown+0x80/0x80 [ 578.171701] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 578.171720] ? do_syscall_64+0x26/0x620 [ 578.180683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.180701] ? do_syscall_64+0x26/0x620 [ 578.180725] __x64_sys_sendmsg+0x78/0xb0 [ 578.180743] do_syscall_64+0xfd/0x620 [ 578.188412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.188426] RIP: 0033:0x45af49 [ 578.188444] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 578.188453] RSP: 002b:00007fe1bb312c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:24:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0779ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000090010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 578.188468] RAX: ffffffffffffffda RBX: 00007fe1bb312c90 RCX: 000000000045af49 [ 578.188477] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 578.188485] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 578.188492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb3136d4 [ 578.188504] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 [ 578.333194] device macvtap543 entered promiscuous mode 20:24:20 executing program 3 (fault-call:6 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) 20:24:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000a0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00f403000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 578.379505] device macvtap508 entered promiscuous mode [ 578.397894] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 578.468281] device macvtap211 entered promiscuous mode 20:24:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef200000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000280012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 578.498913] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 578.528588] FAULT_INJECTION: forcing a failure. [ 578.528588] name failslab, interval 1, probability 0, space 0, times 0 20:24:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077aec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000c0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 578.622698] CPU: 1 PID: 27292 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 578.630539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.630547] Call Trace: [ 578.630574] dump_stack+0x197/0x210 [ 578.630606] should_fail.cold+0xa/0x1b [ 578.650073] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 578.655194] ? lock_downgrade+0x880/0x880 [ 578.659358] __should_failslab+0x121/0x190 [ 578.659377] should_failslab+0x9/0x14 [ 578.659392] kmem_cache_alloc_node_trace+0x274/0x720 [ 578.659413] ? __alloc_skb+0xd5/0x5f0 [ 578.667442] __kmalloc_node_track_caller+0x3d/0x80 [ 578.667467] __kmalloc_reserve.isra.0+0x40/0xf0 [ 578.667492] __alloc_skb+0x10b/0x5f0 [ 578.676388] ? skb_trim+0x190/0x190 [ 578.676408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.676429] ? netlink_autobind.isra.0+0x228/0x310 [ 578.686010] netlink_sendmsg+0x97b/0xd70 [ 578.686035] ? netlink_unicast+0x730/0x730 [ 578.693375] ? selinux_socket_sendmsg+0x36/0x40 [ 578.693391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.693408] ? security_socket_sendmsg+0x8d/0xc0 [ 578.703871] ? netlink_unicast+0x730/0x730 [ 578.703890] sock_sendmsg+0xd7/0x130 [ 578.703910] ___sys_sendmsg+0x803/0x920 [ 578.712192] ? copy_msghdr_from_user+0x430/0x430 [ 578.712217] ? lock_downgrade+0x880/0x880 [ 578.722399] ? kasan_check_read+0x11/0x20 [ 578.722423] ? __fget+0x367/0x540 [ 578.731394] ? iterate_fd+0x360/0x360 [ 578.731421] ? __fget_light+0x1a9/0x230 [ 578.739079] ? __fdget+0x1b/0x20 [ 578.739097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 578.739118] __sys_sendmsg+0x105/0x1d0 [ 578.739133] ? __ia32_sys_shutdown+0x80/0x80 [ 578.739167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 578.748044] ? do_syscall_64+0x26/0x620 [ 578.748061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.748076] ? do_syscall_64+0x26/0x620 [ 578.748097] __x64_sys_sendmsg+0x78/0xb0 [ 578.748115] do_syscall_64+0xfd/0x620 [ 578.755708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.755723] RIP: 0033:0x45af49 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000e0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 578.763669] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 578.763678] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 578.763693] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 [ 578.763705] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 578.772618] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 578.772627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40700e0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:21 executing program 3 (fault-call:6 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) [ 578.772634] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 [ 578.897822] device macvtap544 entered promiscuous mode 20:24:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00f603000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 578.948877] device macvtap509 entered promiscuous mode 20:24:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef300000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.006273] device macvtap212 entered promiscuous mode 20:24:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077bec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40001f0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.032658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 579.060973] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 579.115167] FAULT_INJECTION: forcing a failure. [ 579.115167] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 579.127047] CPU: 1 PID: 27323 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 579.134860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.144223] Call Trace: [ 579.144257] dump_stack+0x197/0x210 [ 579.144286] should_fail.cold+0xa/0x1b [ 579.144310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 579.150519] ? mark_held_locks+0x100/0x100 [ 579.150542] ? sock_sendmsg+0xd7/0x130 [ 579.150566] __alloc_pages_nodemask+0x1ee/0x750 [ 579.150591] ? __alloc_pages_slowpath+0x2870/0x2870 [ 579.159558] ? find_held_lock+0x35/0x130 [ 579.159597] cache_grow_begin+0x91/0x8c0 [ 579.159615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 579.159632] ? check_preemption_disabled+0x48/0x290 [ 579.159654] kmem_cache_alloc_node_trace+0x655/0x720 [ 579.167768] __kmalloc_node_track_caller+0x3d/0x80 [ 579.167793] __kmalloc_reserve.isra.0+0x40/0xf0 [ 579.167813] __alloc_skb+0x10b/0x5f0 [ 579.167832] ? skb_trim+0x190/0x190 [ 579.167852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.177511] ? netlink_autobind.isra.0+0x228/0x310 [ 579.177536] netlink_sendmsg+0x97b/0xd70 [ 579.177562] ? netlink_unicast+0x730/0x730 [ 579.177586] ? selinux_socket_sendmsg+0x36/0x40 [ 579.177603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.185880] ? security_socket_sendmsg+0x8d/0xc0 [ 579.185900] ? netlink_unicast+0x730/0x730 [ 579.185922] sock_sendmsg+0xd7/0x130 [ 579.185946] ___sys_sendmsg+0x803/0x920 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000200010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.196485] ? copy_msghdr_from_user+0x430/0x430 [ 579.196512] ? lock_downgrade+0x880/0x880 [ 579.196534] ? kasan_check_read+0x11/0x20 [ 579.196556] ? __fget+0x367/0x540 [ 579.196581] ? iterate_fd+0x360/0x360 [ 579.206604] ? __fget_light+0x1a9/0x230 [ 579.206624] ? __fdget+0x1b/0x20 [ 579.206641] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 579.206662] __sys_sendmsg+0x105/0x1d0 [ 579.206676] ? __ia32_sys_shutdown+0x80/0x80 [ 579.206710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 579.215062] ? do_syscall_64+0x26/0x620 [ 579.215081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.215097] ? do_syscall_64+0x26/0x620 [ 579.215118] __x64_sys_sendmsg+0x78/0xb0 [ 579.215136] do_syscall_64+0xfd/0x620 [ 579.224282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.224296] RIP: 0033:0x45af49 [ 579.224313] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4002340010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.224321] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 579.224340] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 [ 579.233299] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 579.233309] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 579.233319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 [ 579.233329] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 20:24:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09000000003f0012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 579.439863] device macvtap545 entered promiscuous mode 20:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40003f0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.483374] device macvtap510 entered promiscuous mode [ 579.520555] device macvtap213 entered promiscuous mode 20:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000400010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef400000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.534327] batman_adv: batadv0: Adding interface: veth11 [ 579.545560] batman_adv: batadv0: The MTU of interface veth11 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 579.604574] batman_adv: batadv0: Not using interface veth11 (retrying later): interface not active [ 579.692086] device macvtap511 entered promiscuous mode [ 579.735919] device macvtap546 entered promiscuous mode 20:24:22 executing program 3 (fault-call:6 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) 20:24:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077cec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000480010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000400012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000001f500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000006000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.869865] device macvtap214 entered promiscuous mode 20:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40004a0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077dec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.904555] device macvtap512 entered promiscuous mode 20:24:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef500000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 579.961764] device macvtap547 entered promiscuous mode [ 579.995560] FAULT_INJECTION: forcing a failure. [ 579.995560] name failslab, interval 1, probability 0, space 0, times 0 [ 580.015312] CPU: 0 PID: 27367 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 580.023153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.023170] Call Trace: [ 580.035145] dump_stack+0x197/0x210 [ 580.038802] should_fail.cold+0xa/0x1b [ 580.042719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 580.047844] ? lock_downgrade+0x880/0x880 [ 580.052016] __should_failslab+0x121/0x190 [ 580.056263] should_failslab+0x9/0x14 [ 580.056283] __kmalloc_track_caller+0x2de/0x750 [ 580.056303] ? __lock_acquire+0x6ee/0x49c0 [ 580.056322] ? kstrdup_const+0x66/0x80 [ 580.072895] kstrdup+0x3a/0x70 [ 580.076111] kstrdup_const+0x66/0x80 [ 580.079844] __kernfs_new_node+0xb0/0x6f0 [ 580.084014] ? kmem_cache_alloc_trace+0x152/0x760 [ 580.088883] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 580.093659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.099213] ? vsnprintf+0x32a/0x19a0 [ 580.103039] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 580.108514] ? find_held_lock+0x35/0x130 [ 580.112605] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 580.118088] kernfs_new_node+0x99/0x130 [ 580.122071] kernfs_create_link+0xdd/0x250 [ 580.126298] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 580.131589] sysfs_create_link+0x65/0xc0 [ 580.135655] netdev_adjacent_sysfs_add+0xc2/0x100 [ 580.140508] ? napi_disable+0xc0/0xc0 [ 580.144316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.149846] ? notifier_call_chain+0x1e0/0x230 [ 580.154428] __netdev_adjacent_dev_insert+0x4c7/0x700 [ 580.159616] __netdev_upper_dev_link+0x2af/0x7a0 [ 580.164365] ? find_held_lock+0x35/0x130 [ 580.168434] ? netdev_upper_dev_unlink+0x500/0x500 [ 580.173373] ? lock_downgrade+0x880/0x880 [ 580.177535] netdev_master_upper_dev_link+0x3a/0x50 [ 580.182657] batadv_hardif_enable_interface+0x26a/0xb50 [ 580.188037] ? dev_set_allmulti+0x30/0x30 [ 580.192256] batadv_softif_slave_add+0x8f/0x100 [ 580.196942] ? batadv_softif_slave_del+0xd0/0xd0 [ 580.201705] do_set_master+0x1ca/0x230 [ 580.205638] do_setlink+0x961/0x3670 [ 580.209380] ? rtnl_getlink+0x6b0/0x6b0 [ 580.213358] ? __lock_acquire+0x6ee/0x49c0 [ 580.217604] ? __lock_acquire+0x6ee/0x49c0 [ 580.221842] ? __lock_acquire+0x6ee/0x49c0 [ 580.226070] ? mark_held_locks+0x100/0x100 [ 580.230302] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 580.235479] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 580.240499] ? validate_nla+0x32f/0x810 [ 580.244479] rtnl_newlink+0xbad/0x1600 [ 580.248384] ? rtnl_link_unregister+0x250/0x250 [ 580.253174] ? __lock_acquire+0x6ee/0x49c0 [ 580.257412] ? cpuacct_charge+0x1db/0x360 [ 580.261576] ? __update_load_avg_se+0x5ec/0xa10 [ 580.266247] ? __lock_is_held+0xb6/0x140 [ 580.270305] ? mark_held_locks+0x100/0x100 [ 580.274538] ? finish_task_switch+0x146/0x7c0 [ 580.279038] ? __lock_acquire+0x6ee/0x49c0 [ 580.283272] ? finish_task_switch+0x146/0x7c0 [ 580.287772] ? mark_held_locks+0xb1/0x100 [ 580.292171] ? mark_held_locks+0x100/0x100 [ 580.296398] ? _raw_spin_unlock_irq+0x5e/0x90 [ 580.300884] ? finish_task_switch+0x146/0x7c0 [ 580.305372] ? finish_task_switch+0x118/0x7c0 [ 580.309854] ? switch_mm_irqs_off+0x7fa/0x1360 [ 580.314430] ? __mutex_lock+0xa67/0x1300 [ 580.318495] ? find_held_lock+0x35/0x130 [ 580.322586] ? __lock_is_held+0x80/0x140 [ 580.326669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.332226] ? rtnl_link_unregister+0x250/0x250 [ 580.336912] rtnetlink_rcv_msg+0x463/0xb00 [ 580.341149] ? rtnetlink_put_metrics+0x560/0x560 [ 580.345930] ? netlink_deliver_tap+0x22d/0xc20 [ 580.350520] ? find_held_lock+0x35/0x130 [ 580.354587] netlink_rcv_skb+0x17d/0x460 [ 580.358744] ? rtnetlink_put_metrics+0x560/0x560 [ 580.363532] ? netlink_ack+0xb30/0xb30 [ 580.367423] ? kasan_check_read+0x11/0x20 [ 580.371577] ? netlink_deliver_tap+0x254/0xc20 [ 580.376179] rtnetlink_rcv+0x1d/0x30 [ 580.379901] netlink_unicast+0x53a/0x730 [ 580.383988] ? netlink_attachskb+0x770/0x770 [ 580.388423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.394040] netlink_sendmsg+0x8ae/0xd70 [ 580.398116] ? netlink_unicast+0x730/0x730 [ 580.402415] ? selinux_socket_sendmsg+0x36/0x40 [ 580.407093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.412634] ? security_socket_sendmsg+0x8d/0xc0 [ 580.417395] ? netlink_unicast+0x730/0x730 [ 580.421636] sock_sendmsg+0xd7/0x130 [ 580.425343] ___sys_sendmsg+0x803/0x920 [ 580.429323] ? copy_msghdr_from_user+0x430/0x430 [ 580.434086] ? lock_downgrade+0x880/0x880 [ 580.438244] ? kasan_check_read+0x11/0x20 [ 580.442461] ? __fget+0x367/0x540 [ 580.445921] ? iterate_fd+0x360/0x360 [ 580.449733] ? __fget_light+0x1a9/0x230 [ 580.453713] ? __fdget+0x1b/0x20 [ 580.457186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.462744] __sys_sendmsg+0x105/0x1d0 [ 580.466645] ? __ia32_sys_shutdown+0x80/0x80 [ 580.471068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.475817] ? do_syscall_64+0x26/0x620 [ 580.479783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.485148] ? do_syscall_64+0x26/0x620 [ 580.489143] __x64_sys_sendmsg+0x78/0xb0 [ 580.493208] do_syscall_64+0xfd/0x620 [ 580.497025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.502249] RIP: 0033:0x45af49 [ 580.505433] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.524327] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 580.532034] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 [ 580.539489] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 580.546758] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 580.554026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 20:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40004c0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000002410012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 580.561310] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 [ 580.579177] validate_nla: 27 callbacks suppressed [ 580.579187] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:24:23 executing program 3 (fault-call:6 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) 20:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4065580010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 580.662332] device macvtap215 entered promiscuous mode [ 580.697019] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077eec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000600010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 580.748052] device macvtap548 entered promiscuous mode [ 580.753556] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d000007000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 580.825778] device macvtap513 entered promiscuous mode [ 580.838714] nla_parse: 3 callbacks suppressed [ 580.838725] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 580.867941] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:24:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000000000003f600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 580.903404] FAULT_INJECTION: forcing a failure. [ 580.903404] name failslab, interval 1, probability 0, space 0, times 0 [ 580.928114] CPU: 0 PID: 27392 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 580.935957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.945330] Call Trace: [ 580.947952] dump_stack+0x197/0x210 [ 580.951616] should_fail.cold+0xa/0x1b [ 580.955533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 580.960677] ? lock_downgrade+0x880/0x880 [ 580.964872] __should_failslab+0x121/0x190 [ 580.969135] should_failslab+0x9/0x14 [ 580.972949] kmem_cache_alloc+0x2ae/0x700 [ 580.977141] ? memcpy+0x46/0x50 [ 580.980418] ? kstrdup+0x5a/0x70 [ 580.983781] __kernfs_new_node+0xef/0x6f0 [ 580.987935] ? kmem_cache_alloc_trace+0x152/0x760 [ 580.992775] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 580.997530] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.003068] ? vsnprintf+0x32a/0x19a0 [ 581.006903] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 581.012363] ? find_held_lock+0x35/0x130 [ 581.016427] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 581.021891] kernfs_new_node+0x99/0x130 [ 581.025865] kernfs_create_link+0xdd/0x250 [ 581.030098] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 581.035370] sysfs_create_link+0x65/0xc0 [ 581.039426] netdev_adjacent_sysfs_add+0xc2/0x100 [ 581.044283] ? napi_disable+0xc0/0xc0 [ 581.048199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.053737] ? notifier_call_chain+0x1e0/0x230 [ 581.058323] __netdev_adjacent_dev_insert+0x4c7/0x700 [ 581.063516] __netdev_upper_dev_link+0x2af/0x7a0 [ 581.068267] ? find_held_lock+0x35/0x130 [ 581.072350] ? netdev_upper_dev_unlink+0x500/0x500 [ 581.077289] ? lock_downgrade+0x880/0x880 [ 581.081436] netdev_master_upper_dev_link+0x3a/0x50 [ 581.086448] batadv_hardif_enable_interface+0x26a/0xb50 [ 581.091809] ? dev_set_allmulti+0x30/0x30 [ 581.095957] batadv_softif_slave_add+0x8f/0x100 [ 581.100626] ? batadv_softif_slave_del+0xd0/0xd0 [ 581.105381] do_set_master+0x1ca/0x230 [ 581.109262] do_setlink+0x961/0x3670 [ 581.112979] ? rtnl_getlink+0x6b0/0x6b0 [ 581.116949] ? __lock_acquire+0x6ee/0x49c0 [ 581.121177] ? __lock_acquire+0x6ee/0x49c0 [ 581.125405] ? __lock_acquire+0x6ee/0x49c0 [ 581.129639] ? mark_held_locks+0x100/0x100 [ 581.133882] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 581.139064] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 581.144069] ? validate_nla+0x32f/0x810 [ 581.148075] rtnl_newlink+0xbad/0x1600 [ 581.151991] ? rtnl_link_unregister+0x250/0x250 [ 581.156716] ? __lock_acquire+0x6ee/0x49c0 [ 581.160959] ? cpuacct_charge+0x1db/0x360 [ 581.165101] ? __update_load_avg_se+0x5ec/0xa10 [ 581.169766] ? __lock_is_held+0xb6/0x140 [ 581.173826] ? mark_held_locks+0x100/0x100 [ 581.178078] ? finish_task_switch+0x146/0x7c0 [ 581.182589] ? __lock_acquire+0x6ee/0x49c0 [ 581.186817] ? finish_task_switch+0x146/0x7c0 [ 581.191410] ? mark_held_locks+0xb1/0x100 [ 581.195587] ? mark_held_locks+0x100/0x100 [ 581.199840] ? kasan_check_write+0x14/0x20 [ 581.204073] ? finish_task_switch+0x1db/0x7c0 [ 581.208565] ? switch_mm_irqs_off+0x7fa/0x1360 [ 581.213147] ? __mutex_lock+0xa67/0x1300 [ 581.217202] ? find_held_lock+0x35/0x130 [ 581.221309] ? __lock_is_held+0x80/0x140 [ 581.225388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.230939] ? rtnl_link_unregister+0x250/0x250 [ 581.235612] rtnetlink_rcv_msg+0x463/0xb00 [ 581.239852] ? rtnetlink_put_metrics+0x560/0x560 [ 581.244607] ? netlink_deliver_tap+0x22d/0xc20 [ 581.249178] ? find_held_lock+0x35/0x130 [ 581.253243] netlink_rcv_skb+0x17d/0x460 [ 581.257873] ? rtnetlink_put_metrics+0x560/0x560 [ 581.262639] ? netlink_ack+0xb30/0xb30 [ 581.266535] ? kasan_check_read+0x11/0x20 [ 581.270694] ? netlink_deliver_tap+0x254/0xc20 [ 581.275291] rtnetlink_rcv+0x1d/0x30 [ 581.279120] netlink_unicast+0x53a/0x730 [ 581.283197] ? netlink_attachskb+0x770/0x770 [ 581.287611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.293150] netlink_sendmsg+0x8ae/0xd70 [ 581.297212] ? netlink_unicast+0x730/0x730 [ 581.301444] ? selinux_socket_sendmsg+0x36/0x40 [ 581.306104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.311674] ? security_socket_sendmsg+0x8d/0xc0 [ 581.316435] ? netlink_unicast+0x730/0x730 [ 581.320665] sock_sendmsg+0xd7/0x130 [ 581.324434] ___sys_sendmsg+0x803/0x920 [ 581.328406] ? copy_msghdr_from_user+0x430/0x430 [ 581.333156] ? lock_downgrade+0x880/0x880 [ 581.337347] ? kasan_check_read+0x11/0x20 [ 581.341490] ? __fget+0x367/0x540 [ 581.344945] ? iterate_fd+0x360/0x360 [ 581.348761] ? __fget_light+0x1a9/0x230 [ 581.352730] ? __fdget+0x1b/0x20 [ 581.356086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.361615] __sys_sendmsg+0x105/0x1d0 [ 581.365506] ? __ia32_sys_shutdown+0x80/0x80 [ 581.369947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.374717] ? do_syscall_64+0x26/0x620 [ 581.378683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.384031] ? do_syscall_64+0x26/0x620 [ 581.387997] __x64_sys_sendmsg+0x78/0xb0 [ 581.392061] do_syscall_64+0xfd/0x620 [ 581.395918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.401110] RIP: 0033:0x45af49 [ 581.404336] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.423268] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.431002] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 [ 581.438274] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 581.445543] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 20:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4058650010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000480012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 581.452801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 [ 581.460063] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 [ 581.487345] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000680010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:24 executing program 3 (fault-call:6 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) [ 581.589118] device macvtap549 entered promiscuous mode [ 581.594913] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:24:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000a000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40006c0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 581.646396] device macvtap216 entered promiscuous mode [ 581.657472] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d077fec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400e700010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 581.728870] device macvtap514 entered promiscuous mode [ 581.769308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:24:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef600000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 581.817811] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 581.873826] FAULT_INJECTION: forcing a failure. [ 581.873826] name failslab, interval 1, probability 0, space 0, times 0 [ 581.892125] CPU: 0 PID: 27419 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 581.900069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.909428] Call Trace: [ 581.912030] dump_stack+0x197/0x210 [ 581.915680] should_fail.cold+0xa/0x1b [ 581.919583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 581.924694] ? lock_downgrade+0x880/0x880 [ 581.928857] __should_failslab+0x121/0x190 [ 581.933128] should_failslab+0x9/0x14 [ 581.936937] kmem_cache_alloc+0x2ae/0x700 [ 581.941091] __kernfs_new_node+0xef/0x6f0 [ 581.945235] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 581.950004] ? kernfs_activate+0x192/0x1f0 [ 581.954246] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 581.960136] ? find_held_lock+0x35/0x130 [ 581.964197] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 581.969667] kernfs_new_node+0x99/0x130 [ 581.973643] kernfs_create_link+0xdd/0x250 [ 581.978013] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 581.983304] sysfs_create_link+0x65/0xc0 [ 581.987408] __netdev_adjacent_dev_insert+0x36d/0x700 [ 581.992625] __netdev_upper_dev_link+0x2af/0x7a0 [ 581.997405] ? find_held_lock+0x35/0x130 [ 582.001511] ? netdev_upper_dev_unlink+0x500/0x500 [ 582.006453] ? lock_downgrade+0x880/0x880 [ 582.010626] netdev_master_upper_dev_link+0x3a/0x50 [ 582.015660] batadv_hardif_enable_interface+0x26a/0xb50 [ 582.021029] ? dev_set_allmulti+0x30/0x30 [ 582.025176] batadv_softif_slave_add+0x8f/0x100 [ 582.029834] ? batadv_softif_slave_del+0xd0/0xd0 [ 582.034598] do_set_master+0x1ca/0x230 [ 582.038486] do_setlink+0x961/0x3670 [ 582.042195] ? rtnl_getlink+0x6b0/0x6b0 [ 582.046172] ? __lock_acquire+0x6ee/0x49c0 [ 582.050414] ? __lock_acquire+0x6ee/0x49c0 [ 582.054657] ? __lock_acquire+0x6ee/0x49c0 [ 582.058907] ? mark_held_locks+0x100/0x100 [ 582.063148] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 582.068336] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 582.073369] ? validate_nla+0x32f/0x810 [ 582.077363] rtnl_newlink+0xbad/0x1600 [ 582.081272] ? rtnl_link_unregister+0x250/0x250 [ 582.086101] ? __lock_acquire+0x6ee/0x49c0 [ 582.090487] ? cpuacct_charge+0x1db/0x360 [ 582.094649] ? __update_load_avg_se+0x5ec/0xa10 [ 582.099349] ? __lock_is_held+0xb6/0x140 [ 582.103426] ? mark_held_locks+0x100/0x100 [ 582.107790] ? finish_task_switch+0x146/0x7c0 [ 582.112346] ? __lock_acquire+0x6ee/0x49c0 [ 582.116583] ? finish_task_switch+0x146/0x7c0 [ 582.121131] ? mark_held_locks+0xb1/0x100 [ 582.125309] ? mark_held_locks+0x100/0x100 [ 582.129565] ? _raw_spin_unlock_irq+0x5e/0x90 [ 582.134062] ? finish_task_switch+0x146/0x7c0 [ 582.138567] ? finish_task_switch+0x118/0x7c0 [ 582.143101] ? __mutex_lock+0xa67/0x1300 [ 582.147176] ? find_held_lock+0x35/0x130 [ 582.151325] ? __lock_is_held+0x80/0x140 [ 582.155424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 582.160981] ? rtnl_link_unregister+0x250/0x250 [ 582.165654] rtnetlink_rcv_msg+0x463/0xb00 [ 582.169892] ? rtnetlink_put_metrics+0x560/0x560 [ 582.174693] ? netlink_deliver_tap+0x22d/0xc20 [ 582.179303] ? find_held_lock+0x35/0x130 [ 582.183390] netlink_rcv_skb+0x17d/0x460 [ 582.187475] ? rtnetlink_put_metrics+0x560/0x560 [ 582.192512] ? netlink_ack+0xb30/0xb30 [ 582.196438] ? kasan_check_read+0x11/0x20 [ 582.200618] ? netlink_deliver_tap+0x254/0xc20 [ 582.205444] rtnetlink_rcv+0x1d/0x30 [ 582.209186] netlink_unicast+0x53a/0x730 [ 582.214210] ? netlink_attachskb+0x770/0x770 [ 582.218641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.224193] netlink_sendmsg+0x8ae/0xd70 [ 582.228257] ? netlink_unicast+0x730/0x730 [ 582.232487] ? selinux_socket_sendmsg+0x36/0x40 [ 582.237151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.242682] ? security_socket_sendmsg+0x8d/0xc0 [ 582.247431] ? netlink_unicast+0x730/0x730 [ 582.251659] sock_sendmsg+0xd7/0x130 [ 582.255470] ___sys_sendmsg+0x803/0x920 [ 582.259597] ? copy_msghdr_from_user+0x430/0x430 [ 582.264406] ? lock_downgrade+0x880/0x880 [ 582.268862] ? kasan_check_read+0x11/0x20 [ 582.273006] ? __fget+0x367/0x540 [ 582.276456] ? iterate_fd+0x360/0x360 [ 582.280269] ? __fget_light+0x1a9/0x230 [ 582.284236] ? __fdget+0x1b/0x20 [ 582.287598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 582.293141] __sys_sendmsg+0x105/0x1d0 [ 582.297095] ? __ia32_sys_shutdown+0x80/0x80 [ 582.301535] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 582.306301] ? do_syscall_64+0x26/0x620 [ 582.310291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.315664] ? do_syscall_64+0x26/0x620 [ 582.319698] __x64_sys_sendmsg+0x78/0xb0 [ 582.323784] do_syscall_64+0xfd/0x620 [ 582.327595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.332791] RIP: 0033:0x45af49 [ 582.335999] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.354915] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 582.363319] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 20:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000740010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.370592] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 582.377880] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 582.385209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 [ 582.392497] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 [ 582.415132] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:24 executing program 3 (fault-call:6 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) [ 582.450487] device macvtap550 entered promiscuous mode [ 582.456057] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 582.482671] device macvtap217 entered promiscuous mode 20:24:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000c000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c09000000004c0012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 582.496662] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40007a0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.550502] device macvtap515 entered promiscuous mode 20:24:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0780ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.601372] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:24:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef700000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000810010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.663860] device macvtap551 entered promiscuous mode [ 582.687458] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4005980010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00700e000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.764352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 582.813249] FAULT_INJECTION: forcing a failure. [ 582.813249] name failslab, interval 1, probability 0, space 0, times 0 [ 582.826712] CPU: 0 PID: 27450 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 582.834549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.843919] Call Trace: [ 582.846540] dump_stack+0x197/0x210 [ 582.850199] should_fail.cold+0xa/0x1b [ 582.854117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 582.859242] ? lock_downgrade+0x880/0x880 [ 582.863421] __should_failslab+0x121/0x190 [ 582.867676] should_failslab+0x9/0x14 [ 582.871489] kmem_cache_alloc_trace+0x2cc/0x760 [ 582.876187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 582.881744] ? sysfs_do_create_link_sd.isra.0+0xbb/0x130 [ 582.887227] __netdev_adjacent_dev_insert+0x13a/0x700 [ 582.892438] __netdev_upper_dev_link+0x2e9/0x7a0 [ 582.897214] ? netdev_upper_dev_unlink+0x500/0x500 [ 582.902595] ? lock_downgrade+0x880/0x880 [ 582.906772] netdev_master_upper_dev_link+0x3a/0x50 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4001c00010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.911821] batadv_hardif_enable_interface+0x26a/0xb50 [ 582.917210] ? dev_set_allmulti+0x30/0x30 [ 582.921368] batadv_softif_slave_add+0x8f/0x100 [ 582.926046] ? batadv_softif_slave_del+0xd0/0xd0 [ 582.930822] do_set_master+0x1ca/0x230 [ 582.934717] do_setlink+0x961/0x3670 [ 582.938451] ? rtnl_getlink+0x6b0/0x6b0 [ 582.942441] ? __lock_acquire+0x6ee/0x49c0 [ 582.946705] ? __lock_acquire+0x6ee/0x49c0 [ 582.950957] ? __lock_acquire+0x6ee/0x49c0 [ 582.955203] ? mark_held_locks+0x100/0x100 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4001cc0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 582.959462] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 582.964671] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 582.969707] ? validate_nla+0x32f/0x810 [ 582.973708] rtnl_newlink+0xbad/0x1600 [ 582.977622] ? rtnl_link_unregister+0x250/0x250 [ 582.982334] ? __lock_acquire+0x6ee/0x49c0 [ 582.986580] ? cpuacct_charge+0x1db/0x360 [ 582.990741] ? __update_load_avg_se+0x5ec/0xa10 [ 582.995428] ? __lock_is_held+0xb6/0x140 [ 582.999515] ? mark_held_locks+0x100/0x100 [ 583.003779] ? finish_task_switch+0x146/0x7c0 [ 583.008297] ? __lock_acquire+0x6ee/0x49c0 [ 583.012545] ? finish_task_switch+0x146/0x7c0 [ 583.017062] ? mark_held_locks+0xb1/0x100 [ 583.021238] ? mark_held_locks+0x100/0x100 [ 583.025492] ? _raw_spin_unlock_irq+0x5e/0x90 [ 583.030018] ? finish_task_switch+0x146/0x7c0 [ 583.034527] ? finish_task_switch+0x118/0x7c0 [ 583.039038] ? switch_mm_irqs_off+0x7fa/0x1360 [ 583.043638] ? __mutex_lock+0xa67/0x1300 [ 583.047719] ? find_held_lock+0x35/0x130 [ 583.051882] ? __lock_is_held+0x80/0x140 [ 583.056011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4001ea0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 583.061574] ? rtnl_link_unregister+0x250/0x250 [ 583.066261] rtnetlink_rcv_msg+0x463/0xb00 [ 583.070523] ? rtnetlink_put_metrics+0x560/0x560 [ 583.075298] ? netlink_deliver_tap+0x22d/0xc20 [ 583.079911] ? find_held_lock+0x35/0x130 [ 583.083997] netlink_rcv_skb+0x17d/0x460 [ 583.088076] ? rtnetlink_put_metrics+0x560/0x560 [ 583.092846] ? netlink_ack+0xb30/0xb30 [ 583.096753] ? kasan_check_read+0x11/0x20 [ 583.100926] ? netlink_deliver_tap+0x254/0xc20 [ 583.105536] rtnetlink_rcv+0x1d/0x30 [ 583.109265] netlink_unicast+0x53a/0x730 [ 583.113431] ? netlink_attachskb+0x770/0x770 [ 583.117860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.123420] netlink_sendmsg+0x8ae/0xd70 [ 583.127502] ? netlink_unicast+0x730/0x730 [ 583.131762] ? selinux_socket_sendmsg+0x36/0x40 [ 583.136445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.141995] ? security_socket_sendmsg+0x8d/0xc0 [ 583.146773] ? netlink_unicast+0x730/0x730 [ 583.151021] sock_sendmsg+0xd7/0x130 [ 583.154750] ___sys_sendmsg+0x803/0x920 [ 583.158748] ? copy_msghdr_from_user+0x430/0x430 [ 583.163526] ? lock_downgrade+0x880/0x880 [ 583.167701] ? kasan_check_read+0x11/0x20 [ 583.171864] ? __fget+0x367/0x540 [ 583.175336] ? iterate_fd+0x360/0x360 [ 583.179163] ? __fget_light+0x1a9/0x230 [ 583.183158] ? __fdget+0x1b/0x20 [ 583.186556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.192117] __sys_sendmsg+0x105/0x1d0 [ 583.196007] ? __ia32_sys_shutdown+0x80/0x80 [ 583.200422] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.205169] ? do_syscall_64+0x26/0x620 [ 583.209151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.214541] ? do_syscall_64+0x26/0x620 [ 583.218539] __x64_sys_sendmsg+0x78/0xb0 [ 583.222594] do_syscall_64+0xfd/0x620 [ 583.226388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.231656] RIP: 0033:0x45af49 [ 583.234850] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.253763] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 583.261473] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 [ 583.268744] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 583.276028] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 583.283283] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 [ 583.290552] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 20:24:25 executing program 3 (fault-call:6 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000000000000000ec66de6b", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0100ffff00001d0008000a0014000000"], 0x28}}, 0x0) 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000f00010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 583.310760] device macvtap218 entered promiscuous mode [ 583.348671] device macvtap516 entered promiscuous mode 20:24:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000600012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:24:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0781ec020000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="40fffe0010005f0d0200"/20, @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) 20:24:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d0000000000022ef800000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 583.419829] device macvtap552 entered promiscuous mode [ 583.453101] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:24:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf402, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010005f0d00000f000000000000000000", @ANYRES32=0x0, @ANYBLOB="b4ebecb900000000140012000c0001006d61637674617000040071030a0005000400000000000000"], 0x40}}, 0x0) [ 583.551514] FAULT_INJECTION: forcing a failure. [ 583.551514] name failslab, interval 1, probability 0, space 0, times 0 [ 583.570341] CPU: 0 PID: 27487 Comm: syz-executor.3 Not tainted 4.19.94-syzkaller #0 [ 583.578196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.587571] Call Trace: [ 583.590187] dump_stack+0x197/0x210 [ 583.593847] should_fail.cold+0xa/0x1b [ 583.597768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 583.602898] ? lock_downgrade+0x880/0x880 [ 583.607104] __should_failslab+0x121/0x190 [ 583.611363] should_failslab+0x9/0x14 [ 583.615173] kmem_cache_alloc_trace+0x2cc/0x760 [ 583.619857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.625417] ? sysfs_do_create_link_sd.isra.0+0xbb/0x130 [ 583.630902] __netdev_adjacent_dev_insert+0x13a/0x700 [ 583.636121] __netdev_upper_dev_link+0x2e9/0x7a0 [ 583.640903] ? netdev_upper_dev_unlink+0x500/0x500 [ 583.645874] ? lock_downgrade+0x880/0x880 [ 583.650042] netdev_master_upper_dev_link+0x3a/0x50 [ 583.655077] batadv_hardif_enable_interface+0x26a/0xb50 [ 583.660466] ? dev_set_allmulti+0x30/0x30 [ 583.664619] batadv_softif_slave_add+0x8f/0x100 [ 583.669292] ? batadv_softif_slave_del+0xd0/0xd0 [ 583.674058] do_set_master+0x1ca/0x230 [ 583.677956] do_setlink+0x961/0x3670 [ 583.681705] ? rtnl_getlink+0x6b0/0x6b0 [ 583.685679] ? __lock_acquire+0x6ee/0x49c0 [ 583.689909] ? __lock_acquire+0x6ee/0x49c0 [ 583.694138] ? __lock_acquire+0x6ee/0x49c0 [ 583.698374] ? mark_held_locks+0x100/0x100 [ 583.702666] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 583.707858] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 583.712878] ? validate_nla+0x32f/0x810 [ 583.716872] rtnl_newlink+0xbad/0x1600 [ 583.721050] ? rtnl_link_unregister+0x250/0x250 [ 583.725752] ? __lock_acquire+0x6ee/0x49c0 [ 583.730003] ? cpuacct_charge+0x1db/0x360 [ 583.734141] ? __update_load_avg_se+0x5ec/0xa10 [ 583.738812] ? __lock_is_held+0xb6/0x140 [ 583.742895] ? mark_held_locks+0x100/0x100 [ 583.747157] ? finish_task_switch+0x146/0x7c0 [ 583.751674] ? __lock_acquire+0x6ee/0x49c0 [ 583.755908] ? finish_task_switch+0x146/0x7c0 [ 583.760398] ? mark_held_locks+0xb1/0x100 [ 583.764564] ? mark_held_locks+0x100/0x100 [ 583.768814] ? _raw_spin_unlock_irq+0x5e/0x90 [ 583.773375] ? finish_task_switch+0x146/0x7c0 [ 583.777875] ? finish_task_switch+0x118/0x7c0 [ 583.782392] ? switch_mm_irqs_off+0x2de/0x1360 [ 583.787001] ? __mutex_lock+0xa67/0x1300 [ 583.791102] ? find_held_lock+0x35/0x130 [ 583.795216] ? __lock_is_held+0x80/0x140 [ 583.799283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.804823] ? rtnl_link_unregister+0x250/0x250 [ 583.809531] rtnetlink_rcv_msg+0x463/0xb00 [ 583.813806] ? rtnetlink_put_metrics+0x560/0x560 [ 583.818583] ? netlink_deliver_tap+0x22d/0xc20 [ 583.823175] ? find_held_lock+0x35/0x130 [ 583.827255] netlink_rcv_skb+0x17d/0x460 [ 583.831337] ? rtnetlink_put_metrics+0x560/0x560 [ 583.836117] ? netlink_ack+0xb30/0xb30 [ 583.840008] ? kasan_check_read+0x11/0x20 [ 583.844154] ? netlink_deliver_tap+0x254/0xc20 [ 583.848749] rtnetlink_rcv+0x1d/0x30 [ 583.852479] netlink_unicast+0x53a/0x730 [ 583.856564] ? netlink_attachskb+0x770/0x770 [ 583.860992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.866531] netlink_sendmsg+0x8ae/0xd70 [ 583.870619] ? netlink_unicast+0x730/0x730 [ 583.874914] ? selinux_socket_sendmsg+0x36/0x40 [ 583.879594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.885381] ? security_socket_sendmsg+0x8d/0xc0 [ 583.890162] ? netlink_unicast+0x730/0x730 [ 583.894413] sock_sendmsg+0xd7/0x130 [ 583.898181] ___sys_sendmsg+0x803/0x920 [ 583.900568] ------------[ cut here ]------------ [ 583.902178] ? copy_msghdr_from_user+0x430/0x430 [ 583.902208] ? lock_downgrade+0x880/0x880 [ 583.902229] ? kasan_check_read+0x11/0x20 [ 583.902251] ? __fget+0x367/0x540 [ 583.908278] WARNING: CPU: 1 PID: 2917 at net/batman-adv/bat_iv_ogm.c:597 batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 583.911994] ? iterate_fd+0x360/0x360 [ 583.916121] Kernel panic - not syncing: panic_on_warn set ... [ 583.916121] [ 583.920284] ? __fget_light+0x1a9/0x230 [ 583.950602] ? __fdget+0x1b/0x20 [ 583.953966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.959504] __sys_sendmsg+0x105/0x1d0 [ 583.963394] ? __ia32_sys_shutdown+0x80/0x80 [ 583.967838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.972596] ? do_syscall_64+0x26/0x620 [ 583.976579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.981947] ? do_syscall_64+0x26/0x620 [ 583.985924] __x64_sys_sendmsg+0x78/0xb0 [ 583.989983] do_syscall_64+0xfd/0x620 [ 583.993778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.998960] RIP: 0033:0x45af49 [ 584.002151] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 584.021127] RSP: 002b:00007fe1bb2f1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 584.028839] RAX: ffffffffffffffda RBX: 00007fe1bb2f1c90 RCX: 000000000045af49 [ 584.036115] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 584.043384] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 584.050646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1bb2f26d4 [ 584.057905] R13: 00000000004ca9ed R14: 00000000004e3e60 R15: 0000000000000006 [ 584.065200] CPU: 1 PID: 2917 Comm: kworker/u4:5 Not tainted 4.19.94-syzkaller #0 [ 584.072754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.077103] kobject: 'macvtap219' (00000000af56a737): kobject_add_internal: parent: 'net', set: 'devices' [ 584.082140] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 584.098945] Call Trace: [ 584.100529] kobject: 'macvtap219' (00000000af56a737): kobject_uevent_env [ 584.101550] dump_stack+0x197/0x210 [ 584.101573] panic+0x26a/0x50e [ 584.101595] ? __warn_printk+0xf3/0xf3 [ 584.117603] kobject: 'macvtap219' (00000000af56a737): fill_kobj_path: path = '/devices/virtual/net/macvtap219' [ 584.119173] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 584.119190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.119209] ? __warn.cold+0x5/0x53 [ 584.132844] kobject: 'queues' (000000008c1904bc): kobject_add_internal: parent: 'macvtap219', set: '' [ 584.136204] ? __warn+0xe8/0x1d0 [ 584.136230] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 584.136241] __warn.cold+0x20/0x53 [ 584.136262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.141975] kobject: 'queues' (000000008c1904bc): kobject_uevent_env [ 584.145408] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 584.145427] report_bug+0x263/0x2b0 [ 584.145448] do_error_trap+0x204/0x360 [ 584.145466] ? math_error+0x340/0x340 [ 584.155481] kobject: 'queues' (000000008c1904bc): kobject_uevent_env: filter function caused the event to drop! [ 584.158692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.158708] ? wake_up_klogd+0x99/0xd0 [ 584.158721] ? vprintk_emit+0x2a8/0x6d0 [ 584.158740] ? error_entry+0x7c/0xe0 [ 584.158760] ? trace_hardirqs_off_caller+0x65/0x220 [ 584.165629] kobject: 'rx-0' (000000002ba72a86): kobject_add_internal: parent: 'queues', set: 'queues' [ 584.169039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.169064] do_invalid_op+0x1b/0x20 [ 584.169079] invalid_op+0x14/0x20 [ 584.169096] RIP: 0010:batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 584.169114] Code: 9c ff ff e8 73 c0 35 fa 48 c7 c7 c0 6c 67 88 e8 fb 23 20 fa e9 4d 9c ff ff e8 5d c0 35 fa 48 c7 c7 80 69 67 88 e8 e5 23 20 fa <0f> 0b e9 35 9c ff ff e8 45 c0 35 fa 48 c7 c7 80 69 67 88 e8 cd 23 [ 584.174817] kobject: 'rx-0' (000000002ba72a86): kobject_uevent_env [ 584.181109] RSP: 0018:ffff88809dc77cc8 EFLAGS: 00010282 [ 584.181121] RAX: 0000000000000024 RBX: ffff8880a9452608 RCX: 0000000000000000 [ 584.181131] RDX: 0000000000000000 RSI: ffffffff8155baf6 RDI: ffffed1013b8ef8b [ 584.181140] RBP: ffff88809dc77d30 R08: 0000000000000024 R09: ffffed1015d25079 [ 584.181154] R10: ffffed1015d25078 R11: ffff8880ae9283c7 R12: ffff888054fd5380 [ 584.181162] R13: ffff888053a14000 R14: ffff8880a94525c0 R15: ffff888054fd5380 [ 584.181190] ? vprintk_func+0x86/0x189 [ 584.181215] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 584.188139] kobject: 'rx-0' (000000002ba72a86): fill_kobj_path: path = '/devices/virtual/net/macvtap219/queues/rx-0' [ 584.191590] process_one_work+0x989/0x1750 [ 584.191616] ? pwq_dec_nr_in_flight+0x320/0x320 [ 584.191635] ? lock_acquire+0x16f/0x3f0 [ 584.195713] kobject: 'tx-0' (00000000e851a442): kobject_add_internal: parent: 'queues', set: 'queues' [ 584.199321] ? kasan_check_write+0x14/0x20 [ 584.199338] ? do_raw_spin_lock+0xc8/0x240 [ 584.199362] worker_thread+0x98/0xe40 [ 584.199375] ? trace_hardirqs_on+0x67/0x220 [ 584.199404] kthread+0x354/0x420 [ 584.209990] kobject: 'tx-0' (00000000e851a442): kobject_uevent_env [ 584.215144] ? process_one_work+0x1750/0x1750 [ 584.215162] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 584.215179] ret_from_fork+0x24/0x30 [ 584.220538] Kernel Offset: disabled [ 584.418375] Rebooting in 86400 seconds..