0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000f000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:33 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xf, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:33 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x200482) ioctl$TCSETX(0xffffffffffffffff, 0x5433, &(0x7f0000000140)={0x1cf2, 0x7ab6, [0x6, 0x1, 0x800, 0x1, 0x2], 0x3}) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f00000000c0)={0xfff, "6e1fe77df6a9ee1f3147777d81a8636a82e363654a9e49166f41e22575d2c8a6", 0x0, 0x2, 0x1ff, 0x7, 0x8, 0x1, 0x8, 0x4}) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000040)) 14:09:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x4000000}, 0x0) 14:09:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() ptrace(0x10, r1) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r2, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000140)={0x2, 0x9, {r1}, {r2}, 0x2, 0x7f}) ptrace$cont(0x9, r3, 0x100000000, 0x7) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x21) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_mr_vif\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000440), 0x1000) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r4, 0x80585414, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000003c80), 0x38e, 0x62, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2881, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r8, 0x68e0e8f2c6a4d6d3, 0x0, 0x0, {{}, {}, {0x10}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r8, 0x800, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x5}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x80) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000f00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000060000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:33 executing program 0: semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x76db}) [ 749.332982][T22572] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:09:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x6000000}, 0x0) 14:09:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000006000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:33 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x10, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 749.453345][T22572] tipc: Enabling of bearer <:> rejected, illegal name 14:09:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000ffffff9e000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:33 executing program 0: semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) 14:09:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000fffffff0000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000002d300000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 749.675514][T22592] tipc: Enabling of bearer <:> rejected, illegal name 14:09:34 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x11, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xa000000}, 0x0) 14:09:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r2 = getpid() ptrace(0x10, r2) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r2) wait4(0x0, 0x0, 0x0, 0x0) 14:09:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000fffffff5000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) r0 = semget$private(0x0, 0x0, 0x100) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000240)=""/59) semtimedop(r0, &(0x7f0000000040)=[{0x1, 0xfffe, 0x1000}, {0x0, 0xb, 0x1000}, {}, {0x4, 0x3f}], 0x4, 0x0) 14:09:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000010d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x80d0}, 0x80) 14:09:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) accept$inet6(r0, 0x0, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x2}, {0x0, 0x8, 0x1000}, {0x0, 0x0, 0x1000}], 0x3, 0x0) 14:09:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000020d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x12, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xc000000}, 0x0) 14:09:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000fffffffc000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000030d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e20, @broadcast}, 0x200, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)='erspan0\x00', 0xffff, 0x7ff, 0xfffe}) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c000000b18d9e4c13d0f08f2d3251ce10ab1f6481d711544fe0b700", @ANYRES16=0x0, @ANYBLOB="040828bd7000ffdbdf25040000000800020007000000200001006367726f757076626f786e6574305b73656375726974797070703000"], 0x3c}, 0x1, 0x0, 0x0, 0xb9d21b533f4ff602}, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x7f, 0xfffe}, 0x7) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fcntl$getflags(r3, 0x401) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x1a6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x7d, &(0x7f0000000040)={r7}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000380)={r7, @in={{0x2, 0x4e22, @loopback}}, [0xffffffffffffbfdd, 0x3f, 0x6, 0x3, 0x2, 0x7fff, 0x6, 0x1, 0x80000000, 0x8, 0x40000000, 0x20, 0x5, 0x400, 0x100000000]}, &(0x7f0000000300)=0x100) 14:09:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000007fffffff000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:34 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x13, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xe000000}, 0x0) 14:09:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000040d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000009effffff000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:37 executing program 0: semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x7fff, 0x800}, {0x0, 0xf9a4}, {0x1, 0x8, 0x800}, {0x4, 0x0, 0x1400}, {0x4, 0x0, 0x1000}, {0x0, 0x7, 0x1000}], 0x6, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) 14:09:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x14, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000a0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = getpid() ptrace(0x10, r0) r1 = getpid() ptrace(0x10, r1) setpgid(r0, r1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$netlink(0x10, 0x3, 0xd) r3 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setopts(0x4200, r3, 0x9, 0x80055) tkill(r2, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xf000000}, 0x0) 14:09:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000f0ffffff000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:37 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) r0 = semget(0x0, 0x3, 0x226) semtimedop(r0, &(0x7f0000000040)=[{0x1, 0x1, 0x1800}, {0x3, 0x408, 0x1000}, {0x0, 0x74}, {0x0, 0x4, 0x1000}], 0x4, 0x0) 14:09:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x10000000}, 0x0) 14:09:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x15, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r4, 0x68e0e8f2c6a4d6d3, 0x0, 0x0, {{}, {}, {0x10}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x30, r4, 0x2, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0xdf, 0xffffffd1, 0x9, 0x7}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000180)=@mangle={'mangle\x00', 0x1f, 0x6, 0x468, 0x1b0, 0x308, 0xe0, 0x268, 0xe0, 0x3d0, 0x3d0, 0x3d0, 0x3d0, 0x3d0, 0x6, &(0x7f0000000080), {[{{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x1, 0x9}}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}, {0x1, 0x0, 0x101, {0x3}}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0x40, 0x1}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x200, 0xff0000ff, 0xff, 'veth1_macvtap\x00', 'lo\x00', {0xff}, {0xff}, 0x0, 0x1, 0x48}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x21, 0x3f, 0x2}}}, {{@ip={@broadcast, @local, 0xffffff00, 0xff, 'veth1_to_bond\x00', 'vxcan1\x00', {}, {0xff}, 0x4, 0x3, 0xc4b55d853372566c}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x6a60000, 0x7, @remote, 0x4e20}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x10, "1624", 0x1}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x2, 0xfffffff9, @local, 0x4e22}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c8) r5 = socket$inet6(0x10, 0x2, 0x14) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000680)='/dev/bsg\x00', 0x6a00, 0x0) sendto$inet6(r6, &(0x7f0000000100)="459e2e490ad4b3097532f07b9d133106ad98caa93a25ed4995af6937a8f26f6c81e0a7b3208bbd141fadca37c1a1827c59453a4b9440fc34c42ee8aef12c9c291cefece5fc94d9d70c12ef92ba827a5c52553b193e6c7946c76885809d5d25a2", 0x60, 0x240000a0, 0x0, 0x0) connect(r5, &(0x7f0000000000)=@nfc={0x27, 0x0, 0x0, 0x1}, 0x80) 14:09:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000f0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000f5ffffff000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 0: r0 = semget$private(0x0, 0x0, 0x100) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000240)=""/59) semtimedop(r0, &(0x7f0000000040), 0x0, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) 14:09:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/if_inet6\x00') clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'virt_wifi0\x00', &(0x7f00000000c0)=@ethtool_test={0x1a, 0x6, 0x9, 0x8, [0x5, 0x80000001, 0x9, 0x9f69, 0x8, 0x974, 0x3, 0x6]}}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000080)) [ 753.828115][T22730] tipc: Enabling of bearer <:> rejected, illegal name [ 753.853457][T22730] tipc: Enabling of bearer <:> rejected, illegal name 14:09:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x16, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x60000000}, 0x0) 14:09:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000600d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000fcffffff000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:38 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) r0 = semget$private(0x0, 0x0, 0x100) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000240)=""/59) semtimedop(r0, &(0x7f0000000180), 0x2aaaaaaaaaaaac0c, 0x0) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r2 = dup3(r1, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x440102, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000040)="6407b620f2252407268f4c9ea518ed82e8b9b3fe26ddd9a5dbd594de5f3099b131dc583f56c0ba4c5b41899a1b05326992f9af89cd8e0d3de369c87430a183807c75a53c15c394769accb13a4008aa2b7d1851922c36afde11ec6abc431744d4152536203d6fc01cb55306b1170f9d38893d8a67bde35fb4e3a558569978db08f0e350f9c55ac5c2b56ca43b8972580240af71226e411b1e54fa1304680372b1e9c48d62eaad61d1493a152aae5c1fe0610775e4abf36d503bef082bfac9b7d58ced472c9c997877b55dfbf4fcee1813c0dc8c", 0xd3) 14:09:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000ffffff9e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000020000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x17, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x65580000}, 0x0) 14:09:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() ptrace$cont(0x1f, r0, 0x1, 0x10000) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x64, 0x20) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:38 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x81}, @timestamp, @timestamp], 0x3) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) 14:09:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000002d30d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:38 executing program 3: syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000030000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8003, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) r0 = getpid() ptrace(0x10, r0) r1 = getgid() r2 = getegid() r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x19, 0x4) r6 = socket$pptp(0x18, 0x1, 0x2) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, &(0x7f0000000300)=""/235, &(0x7f0000000140)=0xeb) setgid(r2) r7 = getegid() setgid(r7) r8 = getegid() setgid(r8) r9 = getegid() setgid(r9) getgroups(0x9, &(0x7f0000000080)=[0x0, 0xee00, r2, r7, 0xee01, r8, r9, 0xee01, 0xee00]) setregid(r1, r10) sched_getparam(r0, &(0x7f0000000040)) 14:09:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x8, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fffffff00d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000040000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x6f266fe5}, 0x0) 14:09:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x361400, 0x0) connect$rds(r0, &(0x7f0000000400)={0x2, 0x4e22, @remote}, 0x10) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x3, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) tkill(r2, 0x2) wait4(0x0, 0x0, 0x0, 0x0) 14:09:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002822100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x9, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fffffff50d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r0, &(0x7f00000001c0)=[{{}, 0x17, 0x7ff, 0x8a6f}, {{r1, r2/1000+30000}, 0x11, 0x3, 0x9}, {{r3, r4/1000+10000}, 0x14, 0x1ff, 0x100}, {{0x0, 0x2710}, 0x2, 0x6a, 0x5}, {{0x0, 0x7530}, 0x1f, 0xcaa7, 0xd8a}, {{0x77359400}, 0x12, 0x8001, 0x4}, {{r5, r6/1000+30000}, 0x15, 0xff, 0x1}, {{r7, r8/1000+30000}, 0x12, 0x3f, 0x5}, {{}, 0x16, 0x3, 0x1ff}, {{0x77359400}, 0x4, 0x5, 0xa5}], 0xf0) 14:09:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000a0000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x81000000}, 0x0) 14:09:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_DSP_GETIPTR(r2, 0x800c5011, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)={0xe, 0x7, 0x2, {{0x1, '\x00'}, 0x1}}, 0xe) tkill(r0, 0x20) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fsetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="357307002e6c6f2d604ffdbb4355e973ddeb433bdc6563"], &(0x7f0000000040)='\x00', 0x1, 0x3) wait4(0x0, 0x0, 0x4, 0x0) 14:09:39 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) 14:09:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fffffffc0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000e0000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) getpeername$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x12, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:40 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) r0 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r4 = dup3(r1, r3, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'macvlan0\x00', 0x4}, 0x18) 14:09:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x88a8ffff}, 0x0) 14:09:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000007fffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000f0000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 755.952376][T22890] cgroup: fork rejected by pids controller in /syz3 14:09:40 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}, {0x0, 0xf9a4}], 0x2, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c000000657c0c3088b3d0cefd0b9eb7b84345ca61da66261ce6c80aa023995a619ed68777190000e48f35649b81bd1a90259af892c2a71354f47d4edc337f556a8eab851d1bf6c9", @ANYRES16=r1, @ANYBLOB="ff00008245c5e9a742701332694980d8c800316bad2cb6d439b33516a7c57c48dabc9859ca614a6eefa1020d28c37ed35fc265fad63d63eff0febe90a22367a712266363d0c1989fc83fcd93859ab5acf1421301871723f813afc4a2a741f76fcd31b403b5c0c0f66c44e621627a5ae47c84564cd597dd00f987af9a68615d6e3ee5c0a45ff9af81cbe23b5ee48c49a3df16285108e7837017edbfe684e112d0fe8e0aa4474e515e43cd70454eb3c79aa6484cee7aed34e5dc3f56b8bb560000"], 0x1c}, 0x1, 0x0, 0x0, 0x8004811}, 0x840) syz_open_dev$tty1(0xc, 0x4, 0x4) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa4, r1, 0x1, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffff}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x54}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8801}, 0x854) semtimedop(0x0, &(0x7f0000000180)=[{0x1, 0x0, 0x1000}, {0x0, 0x8, 0x1000}, {}], 0x3, 0x0) 14:09:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4200, r0, 0x6, 0x2) tkill(r0, 0x20) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) finit_module(r1, &(0x7f0000000040)='proc!vboxnet1\x00', 0x0) wait4(0x0, 0x0, 0x0, 0x0) 14:09:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x14, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000600000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000009effffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x9effffff}, 0x0) 14:09:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) getitimer(0x1, &(0x7f0000000000)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0xfffffffffffffeee, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r2, 0x68e0e8f2c6a4d6d3, 0x0, 0x0, {{}, {}, {0x10, 0x17, {0xc}}}}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'macvtap0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40005) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:40 executing program 0 (fault-call:7 fault-nth:0): r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:09:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x19, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000020100000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000f0ffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 756.603028][T23075] tipc: Enabling of bearer <:> rejected, illegal name 14:09:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xe56f266f}, 0x0) [ 756.651326][ T26] audit: type=1804 audit(1580738980.943:433): pid=23078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/538/bus" dev="sda1" ino=16958 res=1 14:09:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000010200000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 756.782319][ T26] audit: type=1804 audit(1580738981.043:434): pid=23185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/538/bus" dev="sda1" ino=16958 res=1 14:09:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000f5ffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:41 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:09:41 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x1a, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000300000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 757.218214][ T26] audit: type=1804 audit(1580738981.503:435): pid=23206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/539/bus" dev="sda1" ino=17048 res=1 [ 757.289682][ T26] audit: type=1804 audit(1580738981.583:436): pid=23212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/539/bus" dev="sda1" ino=17048 res=1 14:09:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000a00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fcffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xffffa888}, 0x0) 14:09:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x2, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:43 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x2, 0x0, 0x8000) 14:09:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x24) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) tkill(r0, 0x20) r2 = socket$inet6(0x10, 0x2, 0x14) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000100)) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) r5 = getpid() ptrace(0x10, r5) wait4(r4, 0x0, 0x8, 0x0) [ 759.593873][ T26] audit: type=1804 audit(1580738983.883:437): pid=23217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/540/bus" dev="sda1" ino=16578 res=1 14:09:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000400000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000e00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 759.713252][ T26] audit: type=1804 audit(1580738984.003:438): pid=23232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/540/bus" dev="sda1" ino=16578 res=1 14:09:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x14, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 759.855557][T23339] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:09:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xffffff7f}, 0x0) 14:09:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000f00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000003000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 760.129844][T23352] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:09:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0xf4240, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000006000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000200000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 760.517180][ T26] audit: type=1804 audit(1580738984.803:439): pid=23232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/540/bus" dev="sda1" ino=16578 res=1 [ 760.605794][ T26] audit: type=1804 audit(1580738984.893:440): pid=23278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/540/bus" dev="sda1" ino=16578 res=1 14:09:44 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x4, 0x0, 0x8000) [ 760.724458][ T26] audit: type=1804 audit(1580738985.013:441): pid=23373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/541/bus" dev="sda1" ino=16978 res=1 [ 760.805054][ T26] audit: type=1804 audit(1580738985.093:442): pid=23374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/541/bus" dev="sda1" ino=16978 res=1 [ 761.709047][ T26] audit: type=1804 audit(1580738986.003:443): pid=23374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/541/bus" dev="sda1" ino=16978 res=1 [ 761.802874][ T26] audit: type=1804 audit(1580738986.093:444): pid=23375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/541/bus" dev="sda1" ino=16978 res=1 [ 761.834683][ T26] audit: type=1804 audit(1580738986.093:445): pid=23378 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/541/bus" dev="sda1" ino=16978 res=1 14:09:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000010d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000300000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xfffffff0}, 0x0) 14:09:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:46 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x7, 0x0, 0x8000) 14:09:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = getpid() ptrace(0x10, r1) r2 = getpid() ptrace(0x10, r2) wait4(r2, &(0x7f0000000080), 0x1000000, 0x0) ptrace$getenv(0x4201, r1, 0x7, &(0x7f0000000000)) r3 = getpid() ptrace(0x10, r3) ptrace$setopts(0x4200, r3, 0x38, 0x48) tkill(r0, 0x20) r4 = getpid() ptrace(0x10, r4) syz_open_procfs(r4, &(0x7f0000000140)='net/sockstat\x00') wait4(0x0, 0x0, 0x0, 0x0) [ 762.724157][ T26] audit: type=1804 audit(1580738987.013:446): pid=23388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/542/bus" dev="sda1" ino=17065 res=1 14:09:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000400000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000002010d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xa00, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0xb10c3ee676768c37, r1}) r2 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x20) wait4(0x0, 0x0, 0x1, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000140)={0xfffffff, 0x20, 0x80000000, r0, 0x0, &(0x7f0000000100)={0x990a93, 0xabd1, [], @p_u8=&(0x7f00000000c0)=0x3}}) sendmsg$nl_route(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400b8ed16000004255a95d618f50000f800000000000000000000006a4d539221b0e6712935d6b6c28aec078b5616dc3108362c55e303537719ef3b3775ea40428514b340f8ecc6d2e3c7bd613dec3907b8ae69eb0fe88d2600842dc5c63579d1de8000fe37680aaccbcbe6b4298c3ae5fcf3997973296ca905eb15776708622aebf22fc191931d678fa44c01b3c3d22f726bb21a9b09084ccce687ba7a2f9aeb92825cfed215cfedf1c6e3a0cd4c8872d8ef3e928eb222ddb5ae04aa91bf05b6755178ed35b34c652e0227400c096e394fc36943"], 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x4840) [ 762.805440][ T26] audit: type=1804 audit(1580738987.063:447): pid=23391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/542/bus" dev="sda1" ino=17065 res=1 14:09:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x40030000000000}, 0x0) 14:09:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x2, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000a00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000020d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x298c84, 0x0) accept$nfc_llcp(r1, 0x0, &(0x7f0000000040)) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000e00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 763.695823][ T26] audit: type=1804 audit(1580738987.983:448): pid=23391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/542/bus" dev="sda1" ino=17065 res=1 [ 763.773508][ T26] audit: type=1804 audit(1580738988.063:449): pid=23676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/542/bus" dev="sda1" ino=17065 res=1 14:09:48 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x9, 0x0, 0x8000) 14:09:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000030d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x4, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000f00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0x1a) ptrace$setopts(0x4206, r0, 0x0, 0x20) rt_tgsigqueueinfo(r0, r0, 0x41, &(0x7f0000000000)={0x1b, 0x400, 0x2}) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 763.801447][ T26] audit: type=1804 audit(1580738988.083:450): pid=23678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/542/bus" dev="sda1" ino=17065 res=1 14:09:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000006000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 763.977115][ T26] audit: type=1804 audit(1580738988.263:451): pid=23696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/543/bus" dev="sda1" ino=17079 res=1 14:09:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000d302000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000040d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 764.096183][ T26] audit: type=1804 audit(1580738988.333:452): pid=23793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/543/bus" dev="sda1" ino=17079 res=1 14:09:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xd1a400, 0x0) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = gettid() ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)=r0) socket$netlink(0x10, 0x3, 0xd) socket$nl_crypto(0x10, 0x3, 0x15) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x300000000000000}, 0x0) 14:09:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000a0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000003000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x2, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() r2 = getpid() ptrace(0x10, r2) r3 = getpid() ptrace(0x10, r3) ptrace(0x4208, r3) tkill(r1, 0x9) socket$netlink(0x10, 0x3, 0xd) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/60) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 14:09:49 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xc, 0x0, 0x8000) 14:09:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x400000000000000}, 0x0) 14:09:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000a000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000e000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x4, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x600000000000000}, 0x0) 14:09:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000f0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x604000, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x3, 0x0) tkill(r1, 0x20) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x200) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x9) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x58042, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) r8 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r8, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) r10 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r10, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r11, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r13}}, 0x20}}, 0x0) ioctl$sock_SIOCDELRT(r10, 0x890c, &(0x7f00000004c0)={0x0, @can={0x1d, r13}, @tipc=@id={0x1e, 0x3, 0x0, {0x4e22, 0x2}}, @isdn={0x22, 0x7f, 0x7f, 0x5, 0xa3}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000480)='team0\x00', 0x5, 0x100000000000, 0x8}) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r15, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r17}}, 0x20}}, 0x0) r18 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r18, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_mreqn(r18, 0x0, 0x23, &(0x7f0000000c80)={@local, @initdev, 0x0}, &(0x7f0000000cc0)=0xc) r20 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r20, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$ifreq_SIOCGIFINDEX_vcan(r20, 0x8933, &(0x7f0000000d00)={'vcan0\x00', 0x0}) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r23, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r22, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r24}}, 0x20}}, 0x0) r25 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r25, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGIFINDEX(r25, 0x8933, &(0x7f0000000d40)={'batadv0\x00', 0x0}) r27 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r27, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCADDRT(r27, 0x890b, &(0x7f0000000dc0)={0x0, @tipc=@id={0x1e, 0x3, 0x0, {0x4e22, 0x4}}, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x3, 0x2}}, @can={0x1d, 0x0}, 0x1f, 0x0, 0x0, 0x0, 0xfffa, &(0x7f0000000d80)='gre0\x00', 0x8, 0x101, 0x5}) r29 = socket$nl_route(0x10, 0x3, 0x0) r30 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r29, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r31}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002640)={'team0\x00', r31}) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r34, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r33, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r35}}, 0x20}}, 0x0) r36 = socket$nl_route(0x10, 0x3, 0x0) r37 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r37, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r36, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r38}}, 0x20}}, 0x0) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r40, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r39, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r41}}, 0x20}}, 0x0) r42 = socket$nl_route(0x10, 0x3, 0x0) r43 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r43, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r42, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r44}}, 0x20}}, 0x0) r45 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r45, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) getsockopt$inet6_IPV6_IPSEC_POLICY(r45, 0x29, 0x22, &(0x7f0000002780)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000002880)=0xe8) r47 = socket$nl_route(0x10, 0x3, 0x0) r48 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r47, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r49}}, 0x20}}, 0x0) r50 = socket$nl_route(0x10, 0x3, 0x0) r51 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r51, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r50, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r52}}, 0x20}}, 0x0) r53 = socket$nl_route(0x10, 0x3, 0x0) r54 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r54, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r53, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r55}}, 0x20}}, 0x0) r56 = socket$nl_route(0x10, 0x3, 0x0) r57 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r57, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r56, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r58}}, 0x20}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003540)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000003640)=0xe8) r60 = socket$nl_route(0x10, 0x3, 0x0) r61 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r61, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r60, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r62}}, 0x20}}, 0x0) r63 = socket$nl_route(0x10, 0x3, 0x0) r64 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r64, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r63, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r65}}, 0x20}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f00000040c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000004080)={&(0x7f0000003680)={0x9ec, r4, 0x400, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x47b}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xfae}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r17}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r19}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0xae7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r24}}}]}}, {{0x8, 0x1, r26}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r28}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r32}, {0x12c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r35}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r38}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r41}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xf59}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xf9}}}]}}, {{0x8, 0x1, r44}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xffffff7f}}, {0x8, 0x6, r46}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xffffff9d}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}]}}, {{0x8, 0x1, r49}, {0x2a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r52}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x34, 0x4, [{0xfffc, 0x81, 0xf0, 0x80a}, {0x0, 0x0, 0x5, 0x2}, {0x0, 0x5, 0x6}, {0x81, 0x5, 0x2, 0xbcf}, {0x57d, 0x8, 0x0, 0x7f}, {0xfff7, 0x8, 0x0, 0x321}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r55}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0xfae8, 0x3, 0xfa, 0x12cb}, {0x10, 0x0, 0x9, 0xfffffffe}, {0x2, 0x8, 0x5, 0x800}, {0x0, 0x7f, 0x43, 0x83fb}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r58}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}]}}, {{0x8, 0x1, r59}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r65}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}]}}]}, 0x9ec}}, 0x4001) 14:09:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000f000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000600d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 765.738857][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.744784][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:09:50 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xd, 0x0, 0x8000) 14:09:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000060000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xa00000000000000}, 0x0) 14:09:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000ffffff9e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) sendto$unix(r1, &(0x7f00000000c0)="d98f23e31921ace9f40cc5293f4e875d9e0e8067c56fc1a2acab25bf2591b36ebc07126c338b2d0376acb27346a860a37f7d06bb7514e95d31972559d6486318c89f32020ac0e6418c50d93533a3f88a6f43771f72", 0x55, 0x800, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e20}, 0x6e) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000002) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000000)="eb565c471af1261c6f56ab9e9b2841610007575f28e182680e07085611d03d0909d447f98a0f47c6386c2c6f8cd0644d556ffb97c478c8a8cff5d3a1168f6aa4233ede978451208530ec8562f22ed4513e9fda6fdb85d5ce1fab71daaaa096f85c7e37b2d243b9bbeec645e665ba34b179f03cd9e0178ae6a6d7d325f0d71d90e9f45b7a72026c085e") 14:09:50 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x2, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000002d3000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fffffff00d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:50 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x4, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xc00000000000000}, 0x0) 14:09:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xeaae, 0xfe00, 0xffff, 0x18, "b6d2ffe202cdbc53"}) r1 = getpid() ptrace(0x10, r1) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r3 = getpid() ptrace(0x10, r3) ptrace$setopts(0x4200, r3, 0x4, 0x38) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fffffff50d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 767.006592][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 767.006615][ T26] audit: type=1804 audit(1580738991.293:463): pid=24161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/545/bus" dev="sda1" ino=17105 res=1 14:09:51 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xf, 0x0, 0x8000) 14:09:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000010000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x1, 0x0) 14:09:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fffffffc0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xe00000000000000}, 0x0) 14:09:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x3f6, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 767.043734][ T26] audit: type=1804 audit(1580738991.333:464): pid=24161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/545/bus" dev="sda1" ino=17105 res=1 [ 767.073118][ T26] audit: type=1804 audit(1580738991.333:465): pid=24202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/545/bus" dev="sda1" ino=17105 res=1 14:09:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000007fffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000040000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 767.215719][ T26] audit: type=1804 audit(1580738991.503:466): pid=24445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/546/bus" dev="sda1" ino=17109 res=1 14:09:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000000)="d5", 0x1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xf00000000000000}, 0x0) 14:09:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x3fa, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 767.342822][ T26] audit: type=1804 audit(1580738991.573:467): pid=24448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/546/bus" dev="sda1" ino=17109 res=1 14:09:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000002000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 768.033615][ T26] audit: type=1804 audit(1580738992.323:468): pid=24448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/546/bus" dev="sda1" ino=17109 res=1 14:09:52 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x0, 0x8000) 14:09:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000009effffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) tkill(r0, 0x20) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0x9e0000, 0x5, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a64, 0x80000000, [], @string}}) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000640), &(0x7f0000000680)=0x4) r5 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f00000006c0)=0xffffffffffffffff, 0x4) ioctl$VIDIOC_SUBDEV_S_FMT(r3, 0xc0585605, &(0x7f00000001c0)={0x1, 0x0, {0x1, 0x1, 0x3002, 0x9, 0xb, 0x6, 0x1, 0x4}}) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x6be6, 0x3, &(0x7f0000000480)=[{&(0x7f0000000240)="7c4df630ef7651be2c2419610a4c4eec9b382d43c01345fe40384e2d536259cc0f69b4f83dc0f7e15e9e5d41ba76180741c026812988a6bbe8f424064c37a739e71496749cb2e4207e55350d6115aa60b544ff74d60cfad49429d6909229aa12fb21fdec40f161b397279114633e7df463209e5be1798a72c7f74cdc5a96f51ba68e55f9a011113c0ea8fbfffc51cab8762ae05dd89b677f04505b5f1883cd763ae2a4c286f469da493e777bf40ee61ddb0c40847fea576e570883553ea68ce9ee874fd0a2692061e57e923edc0d90df0eb60ae0f6a38af3a4f9e022f05228", 0xdf, 0x6}, {&(0x7f0000000380), 0x0, 0x1}, {&(0x7f00000003c0)="30a48521b1735bb1e12fc69ee7a66317e93c91aecba1e4da2726abc16de99a2701f1d54a44f8fc491f9dfa3099f2019a76513d50f1bb1967813d2d84f12c84ee71f18ef3ba16dd631ef9f440d2ca3e07a4483b5d37651b30a224ba8c6395fc71d80f888343787c029f668f1dba3bce47f29cb129f62f2ac20403988f3fd4de7752f2fd07c6fb0fce0f7bc383234e41c4bc", 0x91, 0xe7}], 0x828000, 0x0) r6 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000600)={0x1, 0x0, 0x100, 0x1, {0x200, 0x4, 0x1, 0x7}}) write$P9_RWSTAT(r6, &(0x7f0000000340)={0x7}, 0x7) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f00000005c0)={&(0x7f0000000380), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x28, r7, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4080) 14:09:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x1000000000000000}, 0x0) 14:09:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000003000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:52 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x3fc, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 768.064114][ T26] audit: type=1804 audit(1580738992.353:469): pid=24448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/546/bus" dev="sda1" ino=17109 res=1 [ 768.091549][ T26] audit: type=1804 audit(1580738992.353:470): pid=24576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/546/bus" dev="sda1" ino=17109 res=1 14:09:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000004000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000f0ffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 768.228243][ T26] audit: type=1804 audit(1580738992.513:471): pid=24588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/547/bus" dev="sda1" ino=17110 res=1 [ 768.382385][ T26] audit: type=1804 audit(1580738992.673:472): pid=24641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/547/bus" dev="sda1" ino=17110 res=1 14:09:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x6000000000000000}, 0x0) 14:09:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x9, 0x0, 0x6, 0x0, 0x3b15e9a9, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0xd127, 0x3ff, 0xfff, 0x9, 0x3, 0x29400000}, r0, 0xe, r1, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:52 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x2000, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000a000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:53 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x88, 0x0, 0x8000) 14:09:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000f5ffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x6558000000000000}, 0x0) 14:09:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = getpid() ptrace(0x10, r1) r2 = getpid() ptrace(0x10, r2) wait4(0xffffffffffffffff, 0x0, 0x20000000, 0x0) 14:09:53 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x4000, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000e000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000f000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) 14:09:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000fcffffff0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x6f266fe500000000}, 0x0) 14:09:53 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0xf603, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:53 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xb0, 0x0, 0x8000) 14:09:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000060000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000400000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = getpid() ptrace(0x10, r1) getpgrp(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0xc15c2, 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r5}}, 0x10) r6 = open(&(0x7f0000000300)='./bus\x00', 0xc15c2, 0x0) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r8}}, 0x10) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) r10 = open(&(0x7f0000000300)='./bus\x00', 0xc15c2, 0x0) close(r10) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r10, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r12}}, 0x10) r13 = open(&(0x7f0000000300)='./bus\x00', 0xc15c2, 0x0) close(r13) r14 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r13, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r15}}, 0x10) r16 = open(&(0x7f0000000300)='./bus\x00', 0xc15c2, 0x0) close(r16) r17 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r16, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r18}}, 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000016c0)=ANY=[@ANYRESHEX=r16, @ANYPTR, @ANYRES32=r8, @ANYRES16=r9, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYRESDEC=r12], @ANYPTR=&(0x7f0000001400)=ANY=[@ANYBLOB="561a414e10d4e622834a356b303034ea00b9ecab680047e2aa971112bbc8f730dbdf3d24f1e007f7a3acf80e91f370f59b558fe005d8694dd22fca6d9528fad368fd1dad9ddaa8cf168a043ba763bff18020a12b2e1d982702", @ANYRESHEX=r13], @ANYRESOCT=r5], @ANYBLOB="02e10000"], 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x4, @mcast2, 0x3}, {0xa, 0x4e21, 0xff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, r12, 0x644e}}, 0x48) tkill(r0, 0x33) wait4(0x0, 0x0, 0x0, 0x0) 14:09:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x8100000000000000}, 0x0) 14:09:54 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0xfa03, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 769.838553][T25079] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:09:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000d3020d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:54 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xf0, 0x0, 0x8000) 14:09:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 14:09:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000003000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:54 executing program 3: ioprio_set$uid(0x3, 0x0, 0x4000) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x0, 0x0) delete_module(&(0x7f0000000000)='[wlan1\x00', 0x800) tkill(r1, 0x20) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x3, 0x8, 0x4, 0x20, 0xc6, {}, {0x3, 0x0, 0x1, 0x8, 0x8, 0x7b, "037eb805"}, 0x3, 0x1, @offset=0x2, 0x189, 0x0, r2}) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) r4 = getpid() ptrace(0x10, r4) r5 = getpid() ptrace(0x10, r5) wait4(r5, 0x0, 0x2, 0x0) 14:09:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000030d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 770.250509][T25104] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:09:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000200000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:54 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0xfc03, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:54 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xff0f, 0x0, 0x8000) 14:09:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 14:09:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000a0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:54 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200100, 0x0) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x10010, r0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0xc0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000300000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 14:09:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000400000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x420002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xcc, 0x8, 0x3f, 0x1, 0x0, 0x6, 0x14080, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2d1d8748, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xdbb, 0xfffffffc, 0x2, 0x8, 0x400000, 0x8}, 0xffffffffffffffff, 0x3, r1, 0x9) ptrace$setopts(0x4200, r0, 0x0, 0x0) tkill(r0, 0x20) 14:09:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000f0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:55 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xfff0, 0x0, 0x8000) 14:09:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000a00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 14:09:55 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f00000000c0)={0x1, 0x9, 0x2, 0x9, 0x1, 0x9d1d}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) accept4(r1, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000080)=0x80, 0xc0000) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000600d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000002d30d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000e00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) tkill(r1, 0x20) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000000)={0x1, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e22, @empty}}}, 0x108) wait4(0x0, 0x0, 0x0, 0x0) 14:09:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3f6, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 14:09:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000f00000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 772.584027][ T26] kauditd_printk_skb: 22 callbacks suppressed [ 772.584049][ T26] audit: type=1804 audit(1580738996.873:495): pid=25586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/552/bus" dev="sda1" ino=17126 res=1 [ 772.698957][ T26] audit: type=1804 audit(1580738996.943:496): pid=25483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/552/bus" dev="sda1" ino=17126 res=1 14:09:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xb) r1 = getpid() ptrace(0x10, r1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x1f, &(0x7f0000000000)=""/237) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000400000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:57 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x400000, 0x0, 0x8000) 14:09:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000006000000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:57 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3fa, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 772.752544][ T26] audit: type=1804 audit(1580738996.953:497): pid=25586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/552/bus" dev="sda1" ino=17126 res=1 14:09:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) [ 772.898687][T25722] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:09:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000201000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 772.998494][ T26] audit: type=1804 audit(1580738997.283:498): pid=25773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/553/bus" dev="sda1" ino=17153 res=1 14:09:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) wait4(0x0, 0x0, 0x0, 0x0) 14:09:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000003000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 773.158834][ T26] audit: type=1804 audit(1580738997.353:499): pid=25830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/553/bus" dev="sda1" ino=17153 res=1 14:09:57 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3fc, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 773.409909][T25901] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:09:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000102000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000020d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_init() r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0xfffffffffffffffe, 0x0) tkill(r0, 0x20) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r1) r2 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$read(0xb, r2, &(0x7f0000000080)=""/244, 0xf4) wait4(0x0, 0x0, 0x0, 0x0) 14:09:58 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 774.022867][ T26] audit: type=1804 audit(1580738998.313:500): pid=25830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/553/bus" dev="sda1" ino=17153 res=1 14:09:58 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xffffff17, 0x0, 0x8000) 14:09:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x3}, 0x0) 14:09:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000003000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000030d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = accept4$nfc_llcp(r1, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x180000) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x488003, 0x0) r5 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x4, 0xac00) r6 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r6, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f00000000c0)="940300b2a5f439f42980ed42495553361bb0d438e2ea9e4dd5910ac2c3abfe48faa1ee2fe9499b2468ef223c39fc33da4ec93179d80c03a759d48d51114e6990b1d0c3f61f9e42d7aa9d964877bda104ccb1c7ff65e348e71516d768f020a191f8b380a67bf384280411686802ea39845bd8cb1d0641df102f70fd2dd16e31909ee912fe9b976cad413b5f1f433474a4e49a399c2df3e9dd199066c3de0bbe205551e73b4285", 0xa6}, {&(0x7f0000000180)="96fd1e97accda9762aa843534982c3d06bde3cb0cb15b61da48bddc85e29346f7a7ea97343f9cb088eeed71ee9b3b70fe2d5bb41cff04b4cd7fcbc468659b0796533b8f5d7c591bc211d3cb8a6781e4d813fc6202ce87bf3b06bd82ad43e96fadd3e8fd2d9de0eb8916ed80d52b6b41ab91c5afa524c493a3e41a5a87522334398f9767a097ec052cbdd259a6da7dbc27dea1442daf8fb2c6942b59679b33ea499b964330273a3b490ffcbb7cf0e0be3d50290", 0xb3}, {&(0x7f0000000240)="66c674ef3f0926e05908a3a4061c1e10a84d73ee44535e507307961698d8b02a31b343a0146e5bbd38ba84b28e5c0ecacd24f5f375bbc178b00f19212a55f7cff315a1749e43321c59346851025956b6c6837aa926fdc106868ecb7c0c172591079bafa5ce47dde6198039910101d374c5ae2b5dcd2ac756b94b476617fbef932bbc61b7e3473a71fc995a70f3b048be2c960d5414fc00aef906ccb40d7636ec8e0b8a90ef96bba854d329be702eb2b1d9e0919e23777be734dd55fae99a97540246ba8bccc6884f0ea1e173efff7177144aa02ddb", 0xd5}], 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="28000000006527dc4315e978dd000000", @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32, @ANYRES32=r5, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x48, 0x8000}, 0x40000) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000000)=0x2fa) r7 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r7, 0x0, 0x46) tkill(r7, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 774.163824][ T26] audit: type=1804 audit(1580738998.433:501): pid=25831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/553/bus" dev="sda1" ino=17153 res=1 14:09:58 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 774.398397][ T26] audit: type=1804 audit(1580738998.433:502): pid=26069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/553/bus" dev="sda1" ino=17153 res=1 14:09:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000a000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000040d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 774.511864][ T26] audit: type=1804 audit(1580738998.643:503): pid=26079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/554/bus" dev="sda1" ino=17144 res=1 14:09:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 774.688913][ T26] audit: type=1804 audit(1580738998.723:504): pid=26086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/554/bus" dev="sda1" ino=17144 res=1 14:09:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf603, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000e000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000a0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:59 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xfffffff0, 0x0, 0x8000) 14:09:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) shmctl$IPC_INFO(r0, 0x3, 0x0) r1 = getegid() setgid(r1) get_mempolicy(&(0x7f0000000180), &(0x7f00000001c0), 0x5, &(0x7f0000006000/0x4000)=nil, 0x1) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) write$FUSE_BMAP(r3, &(0x7f00000000c0)={0x18, 0x0, 0x1, {0x3d81}}, 0x18) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000100)) setgid(0x0) r4 = gettid() shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x1, 0xee00, r1, r2, 0x0, 0x131, 0x3}, 0x24a452c0, 0x7, 0x3, 0x10000, r4, 0xffffffffffffffff, 0x91e}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000140)) r5 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x6}, 0x0) 14:09:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000f000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xfa03, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:09:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000f0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000060000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:09:59 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:09:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xa}, 0x0) 14:09:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xfc03, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000600d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:00 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x7ffffffffffff, 0x0, 0x8000) 14:10:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000010000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000040000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000000)=""/200, 0xc8}, &(0x7f0000000100), 0x10}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xc}, 0x0) 14:10:00 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x40000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000040000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000003000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = getpid() ptrace(0x10, r1) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:10:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xe}, 0x0) 14:10:01 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x200000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 776.767877][T26584] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000002000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:01 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0xfffffffffffffff0, 0x0, 0x8000) 14:10:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xf}, 0x0) 14:10:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000010000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)=0x12) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() socket$netlink(0x10, 0x3, 0xd) statx(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x2400, 0x2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="294d565f6b5cea4db4288f699fe0cb41fcc2b58709d1842057d20e34c528a22e2431d326040aa500816024a9a0a732105d4172033e529d688148b1bd52c63473e0209610d72c28a79ed098cf0ecd889e2b4e54dd31b8239540b44d79d4af5707eaef504146b4519b883a7659d4f6b6b23d98a00bc89a5185f0adfdb35a5e25e32dc1c1d0331368b355722a2c63b7325d5e16273d8d41b23747b34ca4e36a50760584c175a83971743073cf9d7f62d73fc5454eb84672b0dc272462476b45619c343c4bb70ac14f3a8ae0e631d4c6478fad1de4aa6091cebcf00d415ae815ffdec801181439d041196acd6634f066942f97bde758cf848e60", 0xf8, 0x80000001}, {&(0x7f0000000180)="8db81963834306f9f74758f3a20d21c44be5b5b186aa544a0d22bfef82533c07f09c7d70ba38727bba869db0b0adead45c01d35663193d232c299d0f518ab5304b78f06cd17a80718ac4bfec8eeb091625d3b38af6571bc24e57b108670ab62c5937f2143cce48daed6fa96ebc766dfcfcae7fe1baf5ddc7d32dca923a6b5dff967e6614e4e9e7a9351344117d3ffd72111f2890b8a1e68d8d03f587f3017dbdcea77d0ca44f653527cfcd5bb012ffde60f342b2b47f5dc6468c88fcbe527bd8ef4fd1556953adc341bb7ef3c11abbef12a91775c2b54658a246e42cd7ea4572c6eb04950a9f2b90bb652afc8d0f", 0xee, 0xfdd}, {&(0x7f0000000280), 0x0, 0xd04f}], 0x50805, &(0x7f0000000540)=ANY=[@ANYBLOB='notail,barrier=flush,tails=off,block-allocator=border,barrier=none,tails=off,block-allocator=notest4,subj_role=,smackfshat=,dont_appraise,euid<', @ANYRESDEC=r2, @ANYBLOB="2c736d61636b6673ff0f000000000000653d2c00ccc5dea11719"]) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000003000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:01 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1000000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d040000686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000004000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:10:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x8090400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x610000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000040)) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:01 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2000000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 777.734001][T26833] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000a000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 778.124843][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 778.124881][ T26] audit: type=1804 audit(1580739002.413:518): pid=26716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/557/bus" dev="sda1" ino=17139 res=1 [ 778.187692][ T26] audit: type=1804 audit(1580739002.473:519): pid=26716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/557/bus" dev="sda1" ino=17139 res=1 14:10:02 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2, 0x8000) 14:10:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x844100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000dd80000686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x60}, 0x0) 14:10:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4000000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000e000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 778.218997][ T26] audit: type=1804 audit(1580739002.473:520): pid=26949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/557/bus" dev="sda1" ino=17139 res=1 [ 778.349990][T26980] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000000)={0x3, 0x9}) 14:10:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000f000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d020300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 778.436995][ T26] audit: type=1804 audit(1580739002.723:521): pid=27066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/558/bus" dev="sda1" ino=17409 res=1 14:10:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x300}, 0x0) 14:10:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x40000000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 778.587303][ T26] audit: type=1804 audit(1580739002.843:522): pid=27068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/558/bus" dev="sda1" ino=17409 res=1 14:10:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000060000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 778.738091][T27184] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:03 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x3, 0x8000) 14:10:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d030300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 778.973802][ T26] audit: type=1804 audit(1580739003.263:523): pid=27192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/559/bus" dev="sda1" ino=17173 res=1 14:10:03 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf6030000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 779.046716][T27205] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. [ 779.084709][ T26] audit: type=1804 audit(1580739003.273:524): pid=27192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/559/bus" dev="sda1" ino=17173 res=1 14:10:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000002010d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000000)=""/1, &(0x7f0000000040)=0x1) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:03 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x4, 0x8000) 14:10:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d040300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 779.263533][ T26] audit: type=1804 audit(1580739003.313:525): pid=27195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/559/bus" dev="sda1" ino=17173 res=1 14:10:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000001020d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 779.364985][T27319] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:03 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xfa030000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 779.399233][ T26] audit: type=1804 audit(1580739003.333:526): pid=27195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/559/bus" dev="sda1" ino=17173 res=1 14:10:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 14:10:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0a0300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 779.560065][ T26] audit: type=1804 audit(1580739003.803:527): pid=27324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/560/bus" dev="sda1" ino=17134 res=1 14:10:03 executing program 3: lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0x0, "8b01f7b5781b"}, 0x8, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() exit(0x0) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000030d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 779.742595][T27439] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0e0300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 14:10:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xfc030000, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000a0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 779.986542][T27455] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:04 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x5, 0x8000) 14:10:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:10:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x14}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0f0300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 780.504091][T27472] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d600300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 780.747766][T27587] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000000c0)=0x5, 0x4) ptrace$pokeuser(0x6, 0x0, 0x8, 0x8) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x0) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(0xffffffffffffffff, 0x40184152, &(0x7f0000000180)={0x0, &(0x7f0000000140)=[&(0x7f0000000100)="7ee2f26eaf23bbef"], 0x80000000}) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000001c0)=0x23, 0x4) ioctl$KDSKBLED(r2, 0x4b65, 0x7) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000000)=0x9) wait4(0x0, 0x0, 0x0, 0x0) 14:10:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000f0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 14:10:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000500686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 780.937043][T27595] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 14:10:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000600686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:05 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x6, 0x8000) 14:10:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 14:10:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000600d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0x16) ptrace$setregset(0x4205, r0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)="c7fab408eb7591d19487030eea4177bb0a5eec5ba29552eb7baeb21752540ed808e4b87012fe4e5467464359b60c4ed548e1754d5a14e0c5063e8b9feaca1069b10e4c8ad4ce2d67c5edbea53a9e", 0x4e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1f) wait4(0x0, 0x0, 0x0, 0x0) 14:10:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000900686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000400000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000a00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x125000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 14:10:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 14:10:06 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000003000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 782.033810][T27851] __nla_validate_parse: 1 callbacks suppressed [ 782.033827][T27851] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:06 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x7, 0x8000) 14:10:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = syz_open_dev$vcsn(0x0, 0x1, 0x240080) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = dup(r3) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r2, 0x100, 0x70bd27, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x24008040) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r5, &(0x7f0000000340)={0x7, 0x7f, 0x1}, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x5, 0x3ff, 0x8}}, 0x28) wait4(0x0, 0x0, 0x0, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/shm\x00', 0x0, 0x0) bind$tipc(r6, &(0x7f0000000240)=@name={0x1e, 0x2, 0x1, {{0x0, 0x1}, 0x2}}, 0x10) 14:10:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000b00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 14:10:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000020d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:06 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001100686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000030d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:07 executing program 3: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x45, 0x20000) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(r0, &(0x7f0000000080), 0x20000000, &(0x7f00000000c0)) wait4(0x0, 0x0, 0x0, 0x0) 14:10:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 14:10:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001200686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 783.437696][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 783.437719][ T26] audit: type=1804 audit(1580739007.723:543): pid=27872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/563/bus" dev="sda1" ino=17193 res=1 14:10:07 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x8, 0x8000) 14:10:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000040d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 14:10:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet(0x2, 0x80001, 0x84) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x7d, &(0x7f0000000040)={r2, 0x0, 0x10}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={r2, 0xffffff81, 0x5, 0x8}, 0xfffffffffffffcdb) tkill(r0, 0x38) wait4(0x0, 0x0, 0x0, 0x0) 14:10:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 783.473548][ T26] audit: type=1804 audit(1580739007.763:544): pid=28103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/563/bus" dev="sda1" ino=17193 res=1 [ 783.499187][ T26] audit: type=1804 audit(1580739007.763:545): pid=28103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/563/bus" dev="sda1" ino=17193 res=1 14:10:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001400686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000a0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x1, 0x0) [ 783.721684][ T26] audit: type=1804 audit(1580739008.013:546): pid=28119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/564/bus" dev="sda1" ino=17160 res=1 14:10:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 14:10:08 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3f6}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 783.903557][ T26] audit: type=1804 audit(1580739008.103:547): pid=28123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/564/bus" dev="sda1" ino=17160 res=1 14:10:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000400686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 783.989535][ T26] audit: type=1804 audit(1580739008.183:548): pid=28123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/564/bus" dev="sda1" ino=17160 res=1 14:10:08 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x9, 0x8000) 14:10:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000e0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 784.122333][ T26] audit: type=1804 audit(1580739008.183:549): pid=28132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/564/bus" dev="sda1" ino=17160 res=1 14:10:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 784.201776][T28249] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:10:08 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3fa}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000f0d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x40000, 0x0) r5 = socket$inet6(0x10, 0x2, 0x14) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x244000, 0x0) write$UHID_CREATE(r6, &(0x7f0000000440)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000003c0)=""/72, 0x48, 0xffff, 0x5, 0x4, 0xfff, 0x800}}, 0x120) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r7 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r7, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r8 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r8, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r9 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r9, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r10 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r10, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r11 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r11, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r12 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x244902, 0x0) r13 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r13, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$netlink(r1, &(0x7f0000000340)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)=[{&(0x7f0000000040)={0x164, 0x11, 0x10, 0x70bd28, 0x25dfdbfd, "", [@nested={0x52, 0x49, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @ipv4=@multicast2}, @generic="344b469de3c8fcc5aa00c3bc456df70f4bbb70597061ba970e14c0363510590ed93cff1d0952097725fd774742cc7e83e1d9d858", @generic="4a2fe02c7c4729cb49b7cea5384d6ffb8f4a"]}, @generic="61e70677a39c30652520e04a44a1124333b4fa41ce0d81a1f18295b02b952815d8e487182d7fba5510d8ee119e4785222f0c36c37801e4ac25746eda9774b266cc0e32ef3b56daf3d31d05e3fe7b62b467b8ff3eb1c5cca32fce2fb1c3f623b71fcc5eb1b598348a7a9e50bd566a69d124882a1e7e57d9a73a4e1d33b16474be2345ed6bd886059e8d6ba3afed679c1ed4a42b6d74e6781da84b58c48c2c5276fee403f216781445674f4905907ead7ea249ac98b29a36056cec8db2a677ed71492bbfa1ecd39dc0a03ebb0de06405181264d3df8b14873b", @typed={0x8, 0x40, 0x0, 0x0, @u32=0x600}, @typed={0x14, 0x5c, 0x0, 0x0, @ipv6=@mcast2}, @generic="f1092af822ab852ef5cbb351"]}, 0x164}, {&(0x7f00000001c0)={0x3c, 0x3c, 0x2, 0x70bd26, 0x25dfdbfd, "", [@typed={0x2a, 0x12, 0x0, 0x0, @str='vmnet1:vmnet0mime_typesecurity)-user)\x00'}]}, 0x3c}], 0x2, &(0x7f00000002c0)=[@rights={{0x24, 0x1, 0x1, [r2, r1, r3, r4, r5]}}, @rights={{0x28, 0x1, 0x1, [r7, r1, 0xffffffffffffffff, r8, r1, r9]}}, @rights={{0x2c, 0x1, 0x1, [r10, r11, r1, r1, r12, r1, r13]}}], 0x80, 0x4c105}, 0x12) wait4(0x0, 0x0, 0x0, 0x0) [ 784.310155][ T26] audit: type=1804 audit(1580739008.563:550): pid=28251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/565/bus" dev="sda1" ino=16706 res=1 14:10:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000500686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 784.441805][ T26] audit: type=1804 audit(1580739008.673:551): pid=28257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/565/bus" dev="sda1" ino=16706 res=1 14:10:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x81, 0x80801) clone(0x70962280, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = getpid() ptrace(0x10, r1) r2 = getpid() ptrace(0x10, r2) ptrace$setopts(0x4200, r2, 0xb, 0x21) get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) tkill(r0, 0x20) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0x80000003, {{0xa, 0x69f5, 0xffffff80, @mcast1, 0x8}}}, 0x88) wait4(0x0, 0x0, 0x0, 0x0) 14:10:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000600d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 784.577978][T28371] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 14:10:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:10:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000600686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:09 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3fc}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 785.089717][ T26] audit: type=1804 audit(1580739009.383:552): pid=28257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/565/bus" dev="sda1" ino=16706 res=1 14:10:09 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xa, 0x8000) 14:10:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x404000, 0x100) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000100)={0x39, 0xffc1, 0xe88b, 0x0, 0xff, 0x2, 0x14, "d9cf2e33ea7f196621176a8f543dec3dfe33a610", "a1da8d42f865f782f0540d39eceaa43d4a82468f"}) wait4(0x0, 0x0, 0x0, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x400, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e21, 0x6d, @ipv4={[], [], @remote}, 0x63}, 0x1c) 14:10:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000040000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000800686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 14:10:09 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000003000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000900686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:10:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace(0x10, r1) socket$netlink(0x10, 0x3, 0xd) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = dup2(r2, r3) ioctl$TIOCL_SELLOADLUT(r4, 0x541c, &(0x7f0000000080)={0x5, 0x7, 0x7, 0x200000000000000, 0x5}) tkill(r0, 0x20) r5 = getpid() ptrace(0x10, r5) r6 = getpid() wait4(r6, 0x0, 0x1000000, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x282080, 0x0) write$P9_RLCREATE(r7, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x8, 0x1, 0x4}, 0x1}}, 0x18) [ 785.447273][T28615] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:09 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010000000000000000000000000010000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:10 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xb, 0x8000) 14:10:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000a00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 14:10:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d040000686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000000)={0x1, 0x0, {0xffffffff, 0x1d8, 0x300f, 0x2, 0xa, 0x6}}) ptrace$setopts(0x4206, r0, 0xfffffffffffffffe, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x0, 0xffffffffffff0000, 0x1}}, 0x28) tkill(r0, 0x20) getsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) wait4(0x0, 0x0, 0x0, 0x0) 14:10:10 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xf603}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 786.353505][T28748] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000b00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000dd80000686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:10 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000000840)={&(0x7f0000000100)=@tipc=@id, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/224, 0xe0}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/131, 0x83}, {&(0x7f0000000440)=""/215, 0xd7}, {&(0x7f0000000540)=""/204, 0xcc}, {&(0x7f0000000640)=""/160, 0xa0}], 0x6, &(0x7f0000000780)=""/188, 0xbc}, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x501000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000880)) [ 786.610682][T28870] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 14:10:11 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xc, 0x8000) 14:10:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001000686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d020300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f0000000000)=""/44) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_dccp_buf(r2, 0x21, 0x80, &(0x7f0000000640)=""/244, &(0x7f0000000740)=0xf4) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) ioctl$KDSETLED(r3, 0x4b32, 0x8000) r4 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x4, 0x300800) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000600)={0x0, 0x8}) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x7, &(0x7f00000004c0)=[{&(0x7f00000000c0)="5bb82cce0e004588498d934d2d47ab2beb9959f2af9f849bd4ecf05911f8447e37407b10e35bd478b9ca5eaf9cb4247ee11f29b929e6e60429fdb1bb0872f4cd", 0x40}, {&(0x7f0000000100)="688ba26eef119dbd5a9a18271273504c3bf04b5c7f8e9940d2bd68a272d2908b949633849bff046db732a4da00ace3a69172aacfb2d2136e1c336cb9c1d5ffbb733116d6f21fdef9ddce8f3bcc86bcd970a2f21b71c51c1a72d26119e340255b6c56a7d237ba34899c9537d3d1951ec54c038cb2d08bc2520fc687ae2417208cb31cedb02a45421970c6b160d067d56223199298f3dab1ff566de4a0da08ca9c8a85021d008b41b3d71b2c659e", 0xad, 0x4b5}, {&(0x7f00000001c0)="50d15f5ba0fbca3feacaac36174a49ffdc4f6d26d957b48a93da0524eb287744d6d8964254414341e71960d99948d2e0e5c617c39c97bfd1eb3118b0064930f2c3bfdeae35c08da444af2b9c38487035028eb86d38d6b504f34512f28a44dc9ee64eb8f1346cd04155f528419e1651dba2eb32ac7d4b79fd2c68e1ddb3eb87c237a5b1f1841929cbb0ce638e7b38c6f4f361b19b84b5ff1223b4acfc9fb1b33d6212f82641154f53ba77", 0xaa, 0x9}, {&(0x7f0000000280)="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", 0xfb, 0x3}, {&(0x7f0000000380)="1f38b5669b8faac357bd0a355c58b96ab4a39ff7d56a40c3cfdac4b2fad276e233e091b009e971ddfeb6", 0x2a, 0x1}, {&(0x7f00000003c0)="2afccc525e31efe2f82ecea749188007ee0472d778eda16547e0fcf4b6a7655bc914c25e87a751fa81a53e5ceae96b30afeb948e78e66428b1154cdf954cfa1621f0c0d5dbf738f6e7e07daf3d3c24bf502e817ddb6344fd1825fa2d", 0x5c, 0x6}, {&(0x7f0000000440)="d84dd39c097c923b1c18933ec278ad344e79f2483a25706333d5e9ee9eeb5201e1d1f5ca19d46edc06c0e385203cefd16ad59161beceb7fc636060143c532725f36e3d047b616d90f45c719dc8457c32927f8e963988bd", 0x57, 0x101}], 0x1115000, &(0x7f0000000580)='cgroup\x00') 14:10:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfc03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 786.936521][T28987] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001100686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xd, 0x8000) 14:10:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d030300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001200686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 14:10:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xe) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) tkill(r1, 0x3b) wait4(0x0, 0x0, 0x0, 0x0) [ 787.446221][T29116] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d040300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 14:10:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001400686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 787.831735][T29233] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x80) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x200000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x140, 0x0) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@RTM_NEWNSID={0x2c, 0x58, 0x10, 0x70bd28, 0x100, {}, [@NETNSA_FD={0x8, 0x3, r3}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_FD={0x8, 0x3, r4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000801) r5 = socket$inet6(0x10, 0x3, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000640)={'wireguard1\x00', r8}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x3b8, 0x0, 0xd0, 0x3b8, 0x0, 0x488, 0x488, 0x488, 0x488, 0x488, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x2}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xa}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x4, 0x5}, {0xffffffffffffffff, 0x0, 0x7}, {0x1, 0x6, 0x1}, 0x401, 0x2}}}, {{@ipv6={@mcast2, @mcast2, [0xffffff00, 0xffffffff, 0xff000000, 0x9d33ec6ed01d8858], [0xff000000, 0x1b6eb374347a55a9, 0xffffffff, 0xffffff00], 'team_slave_0\x00', 'lo\x00', {0xff}, {0xff}, 0x62, 0x80, 0x3, 0x50}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x2d, 0x1c, 0x401}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, [0xff000000, 0x0, 0xff000000, 0xff000000], [0xff, 0xffffffff, 0xff, 0xffffffff], 'virt_wifi0\x00', 'veth0_to_team\x00', {}, {0xff}, 0x62, 0x1, 0x1, 0x10}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv4=@broadcast, 0x36, 0x2c, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b8) wait4(0x0, 0x0, 0x0, 0x0) 14:10:12 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xe, 0x8000) 14:10:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0a0300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0000d8686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = socket$inet6(0x10, 0x2, 0x14) accept4(r1, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80, 0x80000) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) listen(r1, 0x6) wait4(0x0, 0x0, 0x0, 0x0) 14:10:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 788.362806][T29359] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0e0300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/48, 0x30}) 14:10:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000304006173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 788.519895][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 788.519921][ T26] audit: type=1804 audit(1580739012.803:573): pid=29469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/570/bus" dev="sda1" ino=16706 res=1 [ 788.602557][T29474] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3f6}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) [ 788.694574][ T26] audit: type=1804 audit(1580739012.903:574): pid=29476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/570/bus" dev="sda1" ino=16706 res=1 14:10:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0f0300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 789.017399][T29595] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 789.350101][ T26] audit: type=1804 audit(1580739013.643:575): pid=29476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/570/bus" dev="sda1" ino=16706 res=1 14:10:13 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xf, 0x8000) 14:10:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000302686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3fa}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = socket$inet6(0xa, 0xa, 0xd3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef48004d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd61703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xfffffffffffffd22, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a40)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)=')\x00', r3}, 0x30) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000100)=r4) r5 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa3, 0x0, 0x0, 0x0, 0x60}, 0x2af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r5, 0x4004550c, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d600300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 789.406320][ T26] audit: type=1804 audit(1580739013.693:576): pid=29599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/570/bus" dev="sda1" ino=16706 res=1 [ 789.431418][ T26] audit: type=1804 audit(1580739013.693:577): pid=29600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/570/bus" dev="sda1" ino=16706 res=1 [ 789.534638][T29609] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 789.544097][ T26] audit: type=1804 audit(1580739013.823:578): pid=29611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/571/bus" dev="sda1" ino=17203 res=1 [ 789.602537][ T26] audit: type=1804 audit(1580739013.883:579): pid=29617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/571/bus" dev="sda1" ino=17203 res=1 14:10:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000500686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000303686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 14:10:14 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3fc}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:14 executing program 3: r0 = getpid() ptrace(0x10, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000040)={0x80000001, 0x1}) tkill(r2, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 789.892298][T29728] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 14:10:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000600686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 790.373953][ T26] audit: type=1804 audit(1580739014.663:580): pid=29617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/571/bus" dev="sda1" ino=17203 res=1 14:10:14 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x10, 0x8000) 14:10:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x6f266fe5}, 0x0) 14:10:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000304686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:14 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000900686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x2040, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0xffffffe5, 0x4) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0x4, 0x7, 0x4, 0x400000, 0xfffffff8, {r3, r4/1000+30000}, {0x5, 0x1, 0xdd, 0x7f, 0x4, 0xb4, "359e8a02"}, 0x5, 0x3, @offset=0x730e, 0x0, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r5, 0x80dc5521, &(0x7f00000000c0)=""/115) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r6 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r6, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x1a6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x7d, &(0x7f0000000040)={r9}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r9, 0x9}, &(0x7f0000000180)=0x8) [ 790.407811][ T26] audit: type=1804 audit(1580739014.693:581): pid=29611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/571/bus" dev="sda1" ino=17203 res=1 [ 790.435551][ T26] audit: type=1804 audit(1580739014.713:582): pid=29617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/571/bus" dev="sda1" ino=17203 res=1 14:10:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000a00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d00030a686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="16c858b62d777e9b55cbcf2fc771a0b66036e592727a67e6327235bb9dc4992473c0e6ca9fedb00cec90083bbea862c0480d354bd3fe124f0e4eea6b5984b44177dd8b9e3eed92ac5734f5347cb814e35ea6126d474df59d7612e2580be410149e211167aed8d59090e0d9fabde11f6e978570d5e78000a0dd306b6a10b54c4bed7bdb2cc5bfec77a4586b8714ac87f82f7dca6ae0153a549086fc2c228b9a768ad08b12ec84119e652d7b3875243860825c0aada8f775e87eb57230669de3c8f6ad13aef2e0af55d5eaec310931b90709461121e1c4b94fd241a8582b2f5f2ee115fa50ac49f1b536bd25cb4ddfacf59a66179707c0ee00fa", 0xf9) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, 0x16, 0x20, 0x70bd28, 0x25dfdbfe, {0x1a}, [@generic="08ed632f26c63b7464440449b04a50943062fb701bed31209813014bf2909bca0bcffd22ff0d88b6b9e24a419ecbfc854b09ba47e01262e37a9b0894fe531d135220e38979c9e9d0af713db873"]}, 0x64}, 0x1, 0x0, 0x0, 0x40d0}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 14:10:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 14:10:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000b00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:15 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x11, 0x8000) 14:10:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d00030e686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 14:10:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001100686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:15 executing program 3: r0 = getpid() ptrace(0x10, r0) r1 = getpid() ptrace(0x10, r1) r2 = getpid() ptrace(0x10, r2) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r4, 0x0, 0x2, &(0x7f0000000040)='@\x00'}, 0x30) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r5, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xe) r6 = getpid() ptrace(0x10, r6) prctl$PR_SET_PTRACER(0x59616d61, r6) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() r8 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r8, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) syncfs(r8) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x20) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() setgid(r10) r11 = getegid() setgid(r11) setresgid(r9, r10, r11) wait4(0x0, 0x0, 0x0, 0x0) 14:10:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf603}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001200686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d00030f686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x20000000332b1700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 14:10:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:16 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x12, 0x8000) 14:10:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000360686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:16 executing program 3: clone(0xa0000200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20441) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000003c0)=0x200, &(0x7f0000000400)=0x4) wait4(0x0, 0x0, 0x0, 0x0) 14:10:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfc03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001400686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d613e0000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xe56f266f}, 0x0) 14:10:16 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x13, 0x8000) 14:10:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000400686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61f70100000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000000)) tkill(r0, 0x20) wait4(0x0, 0x0, 0x1000000, 0x0) 14:10:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 792.555159][T30463] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 14:10:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 14:10:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000500686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630200000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4200, r0, 0x3, 0x100042) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 792.814607][T30580] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 14:10:17 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000600686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630300000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x14, 0x8000) 14:10:17 executing program 3: r0 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x7) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000140)='\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = getpid() ptrace(0x10, r2) tkill(r1, 0xa0) wait4(0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x50300) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000040)=""/94) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000100)=0x0) ptrace$setopts(0x4206, r5, 0x100000001, 0x4d) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101780, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) write$P9_RREADDIR(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0], 0x1014) 14:10:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 14:10:17 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000800686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630400000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630a00000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000900686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 793.567507][ T26] kauditd_printk_skb: 18 callbacks suppressed [ 793.567533][ T26] audit: type=1804 audit(1580739017.853:601): pid=30769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/576/bus" dev="sda1" ino=17215 res=1 [ 793.693724][ T26] audit: type=1804 audit(1580739017.973:602): pid=30823 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/576/bus" dev="sda1" ino=17215 res=1 14:10:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:10:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = getpid() ptrace(0x10, r1) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) clock_gettime(0x0, &(0x7f0000005b40)={0x0, 0x0}) recvmmsg(r2, &(0x7f00000058c0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000080)=""/249, 0xf9}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/204, 0xcc}, {&(0x7f0000001280)=""/192, 0xc0}, {&(0x7f0000001340)=""/77, 0x4d}, {&(0x7f00000013c0)=""/104, 0x68}], 0x6, &(0x7f00000014c0)=""/4096, 0x1000}, 0x1}, {{&(0x7f00000024c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002900)=[{&(0x7f0000002540)=""/218, 0xda}, {&(0x7f0000002640)=""/76, 0x4c}, {&(0x7f00000026c0)}, {&(0x7f0000002700)=""/20, 0x14}, {&(0x7f0000002740)=""/138, 0x8a}, {&(0x7f0000002800)=""/80, 0x50}, {&(0x7f0000002880)=""/10, 0xa}, {&(0x7f00000028c0)=""/15, 0xf}], 0x8, &(0x7f0000002980)=""/186, 0xba}}, {{&(0x7f0000002a40)=@l2, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002ac0)=""/179, 0xb3}, {&(0x7f0000002b80)=""/203, 0xcb}], 0x2, &(0x7f0000002cc0)=""/218, 0xda}, 0x8000}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002dc0)=""/121, 0x79}, {&(0x7f0000002e40)=""/193, 0xc1}, {&(0x7f0000002f40)=""/231, 0xe7}], 0x3, &(0x7f0000003080)=""/24, 0x18}, 0xffffffff}, {{&(0x7f00000030c0)=@caif=@dbg, 0x80, &(0x7f0000003240)=[{&(0x7f0000003140)=""/189, 0xbd}, {&(0x7f0000003200)=""/57, 0x39}], 0x2, &(0x7f0000003280)=""/198, 0xc6}, 0x3e5}, {{&(0x7f0000003380)=@phonet, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003400)=""/155, 0x9b}], 0x1, &(0x7f0000003500)=""/160, 0xa0}, 0xffffff80}, {{&(0x7f00000035c0)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000003900)=[{&(0x7f0000003640)=""/185, 0xb9}, {&(0x7f0000003700)=""/215, 0xd7}, {&(0x7f0000003800)=""/8, 0x8}, {&(0x7f0000003840)=""/149, 0x95}], 0x4, &(0x7f0000003940)=""/139, 0x8b}}, {{&(0x7f0000003a00)=@tipc=@name, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/46, 0x2e}, {&(0x7f0000003ac0)=""/249, 0xf9}, {&(0x7f0000003bc0)=""/162, 0xa2}], 0x3, &(0x7f0000003cc0)=""/37, 0x25}, 0x817}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000003d00)=""/178, 0xb2}, {&(0x7f0000003dc0)=""/192, 0xc0}, {&(0x7f0000003e80)=""/135, 0x87}, {&(0x7f0000003f40)=""/140, 0x8c}, {&(0x7f0000004000)=""/40, 0x28}, {&(0x7f0000004040)=""/240, 0xf0}, {&(0x7f0000004140)=""/169, 0xa9}, {&(0x7f0000004200)=""/183, 0xb7}], 0x8}, 0x3}, {{&(0x7f0000004340)=@ax25={{0x3, @null}, [@null, @remote, @rose, @null, @remote, @netrom, @null, @netrom]}, 0x80, &(0x7f0000005740)=[{&(0x7f00000043c0)=""/5, 0x5}, {&(0x7f0000004400)=""/66, 0x42}, {&(0x7f0000004480)=""/131, 0x83}, {&(0x7f0000004540)=""/31, 0x1f}, {&(0x7f0000004580)=""/192, 0xc0}, {&(0x7f0000004640)=""/74, 0x4a}, {&(0x7f00000046c0)=""/4096, 0x1000}, {&(0x7f00000056c0)=""/94, 0x5e}], 0x8, &(0x7f00000057c0)=""/243, 0xf3}, 0x8}], 0xa, 0x102, &(0x7f0000005b80)={r3, r4+10000000}) r5 = getpid() ptrace(0x10, r5) ptrace$setopts(0x4200, r5, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 793.845570][ T26] audit: type=1804 audit(1580739018.053:603): pid=30823 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/576/bus" dev="sda1" ino=17215 res=1 14:10:18 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x15, 0x8000) 14:10:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000a00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630e00000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 793.971465][ T26] audit: type=1804 audit(1580739018.063:604): pid=30829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/576/bus" dev="sda1" ino=17215 res=1 [ 794.148628][ T26] audit: type=1804 audit(1580739018.433:605): pid=30950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/577/bus" dev="sda1" ino=17221 res=1 14:10:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r2 = semget$private(0x0, 0x0, 0x100) semctl$SEM_INFO(r2, 0x1, 0x13, &(0x7f0000000240)=""/59) semctl$GETNCNT(r2, 0x4, 0xe, &(0x7f0000000040)=""/5) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r3, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630f00000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 14:10:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000b00686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 794.280091][ T26] audit: type=1804 audit(1580739018.513:606): pid=30952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/577/bus" dev="sda1" ino=17221 res=1 14:10:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) openat$cgroup_int(r1, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61636000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001000686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 795.035993][ T26] audit: type=1804 audit(1580739019.323:607): pid=30952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/577/bus" dev="sda1" ino=17221 res=1 14:10:19 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x16, 0x8000) 14:10:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 14:10:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001100686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163d302000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000040)={0x0, 0x1000, 0x8001, [], &(0x7f0000000000)=0x81}) ptrace$setopts(0x4200, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf6030000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 795.088845][ T26] audit: type=1804 audit(1580739019.323:608): pid=30950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/577/bus" dev="sda1" ino=17221 res=1 [ 795.141741][ T26] audit: type=1804 audit(1580739019.353:609): pid=30952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/577/bus" dev="sda1" ino=17221 res=1 14:10:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630003000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x74040, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r1, 0x80044dfc, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x1) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001200686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x2) [ 795.302208][ T26] audit: type=1804 audit(1580739019.593:610): pid=31304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/578/bus" dev="sda1" ino=17227 res=1 14:10:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000a000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfa030000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:20 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x17, 0x8000) 14:10:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x3) 14:10:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) 14:10:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000e000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:20 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfc030000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) clone3(&(0x7f0000000300)={0x84000, &(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x2e}, &(0x7f00000000c0)=""/254, 0xfe, &(0x7f00000001c0)=""/229, &(0x7f00000002c0)=[r0], 0x1}, 0x50) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x20000020) wait4(0x0, 0x0, 0x0, 0x0) 14:10:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000f000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d001400686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x4) 14:10:20 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630060000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:21 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x18, 0x8000) 14:10:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0000d8686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616302d3000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000000)) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:21 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x2}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6) 14:10:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000304006173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000105000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x3, 0x41) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 14:10:21 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x4}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000302686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000205000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:22 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x19, 0x8000) 14:10:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xa) 14:10:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000303686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7404, 0x2, 0x4, 0x800, 0xff, {r1, r2/1000+30000}, {0xa, 0x2, 0x0, 0x1, 0x8, 0xfd, "64fd8de0"}, 0x1, 0x3, @fd, 0x81, 0x0, 0xffffffffffffffff}) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) setsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000000140)="e7531775c7a5c708eb7cb40e244977e0384524385c70f70acad91d5f5b0bc832bdca67d33741177228fd4a3dfe53bd83059e73894e2049323b83ea3336897ab0665724eee09c4d725f1436e6b551d1afac3b02649bb8177f3a39f9d1f2ec12977d33380bb6e68a423e5a465c818f400f8852dae64dcec2b63c77bfd9d3a4", 0x7e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:22 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000304686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000405000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 798.589042][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 798.589064][ T26] audit: type=1804 audit(1580739022.883:626): pid=32046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/581/bus" dev="sda1" ino=17252 res=1 14:10:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xc) 14:10:23 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x2}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x8, 0xb, 0x11}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_PROTOCOLS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22150240}, 0xc, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r4, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x5c010}, 0x40000a4) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, r4, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008841}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 14:10:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000a05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 799.332454][ T26] audit: type=1804 audit(1580739023.613:627): pid=32046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/581/bus" dev="sda1" ino=17252 res=1 14:10:23 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1a, 0x8000) 14:10:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d00030a686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xe) 14:10:23 executing program 3: ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000040)={0xd1d7, 0xffff, {0x0}, {0xee00}, 0xaf, 0x7}) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$netlink(0x10, 0x3, 0xd) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20000, 0x0) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x7fffffff, 0x5, 0x4, 0x2000000, 0x6, {}, {0x5, 0x2, 0x3, 0x80, 0x6, 0x40, "d3e3e389"}, 0x2, 0x2, @userptr=0x9, 0x0, 0x0, 0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000200)={0x25, 0x3, 0x0, {0x3, 0x4, 0x0, '#GPL'}}, 0x25) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000140)={0x0, 0x4, 0x81, r2, 0x0, &(0x7f0000000100)={0x9a0919, 0x6, [], @p_u16=&(0x7f00000000c0)=0x1}}) write$P9_RWSTAT(r6, &(0x7f0000000340)={0xfffffffffffffdd2}, 0x7) ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, &(0x7f0000000000)) r7 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r7, &(0x7f0000000340)={0x7}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, &(0x7f0000000380)={@vsock={0x28, 0x0, 0xffffd8ee, @hyper}, {&(0x7f0000000280)=""/20, 0x14}, &(0x7f00000002c0)}, 0xa0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttynull\x00', 0x644480, 0x0) 14:10:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:23 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x4}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 799.365763][ T26] audit: type=1804 audit(1580739023.653:628): pid=32049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/581/bus" dev="sda1" ino=17252 res=1 [ 799.390585][ T26] audit: type=1804 audit(1580739023.653:629): pid=32175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/581/bus" dev="sda1" ino=17252 res=1 14:10:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d00030e686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 799.546146][ T26] audit: type=1804 audit(1580739023.833:630): pid=32189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/582/bus" dev="sda1" ino=17260 res=1 14:10:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000f05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0xffffffffffffffff, r2) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x102, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) 14:10:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xf) [ 799.704051][ T26] audit: type=1804 audit(1580739023.893:631): pid=32292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/582/bus" dev="sda1" ino=17260 res=1 14:10:24 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x3f6}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d00030f686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 800.368238][ T26] audit: type=1804 audit(1580739024.653:632): pid=32292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/582/bus" dev="sda1" ino=17260 res=1 [ 800.430719][ T26] audit: type=1804 audit(1580739024.723:633): pid=32292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/582/bus" dev="sda1" ino=17260 res=1 14:10:24 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1b, 0x8000) 14:10:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000006005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000360686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x10) 14:10:24 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f0000000240)=@xdp, &(0x7f0000000380)=0x80) write$binfmt_aout(r0, &(0x7f0000000940)={{0xcc, 0x8, 0x2, 0x305, 0x255, 0x4, 0x25b, 0x2}, "32651d8bbb3643ed76cd8956f0ee13e7a7ba321018da73b972518c55c08291f75a09092abf31c8663d56f11081cc72c41f08a206b39ddf3f5a04b272d929df54a6428899b71e3ca1537fe34b6b3da32e2464cf832b462f8e68cf649524d41aa1b9251ddc8fb4297a763b244143f8770fc4ae026cc54556b739ca957c85f885dfeee549a2b0fecec9f2efd3e296288734dbe05c1f167f0d47958c2faa0b7c5a861ce9503bd1223910b204dc06cf50e21c4a8e1aa9724149a407d02466378ef9e4c9b75c47996ad108acbd24fc465ebdb32629b0c6918fd1773a988c6f51cd935285417cece9fb37ec61a8a62f835d7f9f55", [[], [], [], [], [], [], [], [], [], []]}, 0xb11) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$netlink(0x10, 0x3, 0x6) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r4, 0x0) getuid() r5 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x241, 0x0) ioctl$TCSBRK(r6, 0x5409, 0x1000) mount$9p_unix(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1402, &(0x7f0000000200)={'trans=unix,', {[{@mmap='mmap'}, {@posixacl='posixacl'}]}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00082cbd7000ffdbdf25010000001927061e03000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4004041}, 0x40840) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:24 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x3fa}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 800.458868][ T26] audit: type=1804 audit(1580739024.723:634): pid=32421 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/582/bus" dev="sda1" ino=17260 res=1 14:10:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163ffffff9e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d613e0000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 800.685092][ T26] audit: type=1804 audit(1580739024.973:635): pid=32510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/583/bus" dev="sda1" ino=17265 res=1 14:10:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000002d305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x40110000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x10800, 0x90) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x8, 0x4, {0xffffffffffffffff}, {r1}, 0x3f, 0x1}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0xc2, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000240)={0x16, 0x17, 0x2, {0xd, './file0/file0'}}, 0x16) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000140)={0x7, "c04a746226cccab20b0f919d323ea36cc0176dd5d9e85dd051b04ddf13ad12a980cfcdaba9cb235d0a813af2d421966763f5fc3f805e7db98fc2c15709460b9d", {0x1, 0x9}}) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000100)={0xff, 0x0, {r2}, {r4}, 0x22, 0x1}) r5 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r6, 0x40086200, &(0x7f0000000040)=0x5) 14:10:25 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x3fc}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x60) 14:10:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x300) 14:10:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61f70100000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x1000000, 0x100015) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) recvfrom$unix(r1, &(0x7f0000000000)=""/84, 0x54, 0x10060, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 14:10:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fffffff005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:25 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1c, 0x8000) 14:10:25 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x2000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fffffff505000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x600) 14:10:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630200000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:26 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x4000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fffffffc05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:26 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1d, 0x8000) 14:10:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xa00) 14:10:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630300000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:26 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0xa10000, 0x6, 0x1e, r1, 0x0, &(0x7f00000000c0)={0x990a90, 0x4, [], @p_u8=&(0x7f0000000080)=0x1}}) r7 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r7, &(0x7f0000000340)={0x7}, 0x7) r8 = getpid() r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x430000, 0x0) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r11 = socket$inet(0x2, 0x80001, 0x84) r12 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r12, &(0x7f0000000340)={0x7}, 0x7) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r14 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r14, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x1a6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x7d, &(0x7f0000000040)={r15}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r12, 0x84, 0x6c, &(0x7f0000000440)={r15, 0x68, "58cfb4b92be48e4ad3f6466589d92ebb5a56120a3d6f198c4779b81fa454e8d96df239bcb871506672c3c937c07f9fff3a05e88875e8cb6be33aeb99d425e035eca9d9fe5eaf7f02a9d77f71cd315bdcc02a17bf205a57cfab83d5911d5d0d7bc92d4f5b3c4f52b5"}, &(0x7f00000004c0)=0x70) getsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x1a6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x7d, &(0x7f0000000040)={r16}, &(0x7f00000000c0)=0xc) r17 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r18 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r18, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x1a6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r17, 0x84, 0x7d, &(0x7f0000000040)={r19}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r9, 0x84, 0xe, &(0x7f0000000380)={r16, 0x9, 0x6, 0x9, 0x800, 0x6, 0x9, 0xfffff000, {r19, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @remote}, 0x8}}, 0x0, 0x3e, 0x101, 0x3, 0x8}}, &(0x7f0000000300)=0xb0) ptrace(0x10, r8) r20 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r20, &(0x7f0000000340)={0x7}, 0x7) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r6}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r7}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x10001, 0x1}}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r20}]}, 0x68}, 0x1, 0x0, 0x0, 0x50}, 0x4040090) 14:10:26 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0xf603}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61637fffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630400000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 802.458880][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.465376][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:10:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61639effffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xc00) 14:10:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630a00000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000600)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="2100000000000000000001001f0008000100", @ANYRES32=r3, @ANYBLOB="3c000280"], 0x58}, 0x1, 0x0, 0x0, 0x84004}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r4, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x800) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) ioctl$TIOCMGET(r5, 0x5415, &(0x7f0000000140)) r6 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x20) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725", 0xbf, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r7, r7}, &(0x7f0000000480)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'wp256-generic\x00'}}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000005c0)={'bridge_slave_0\x00', 0x401}) keyctl$update(0x2, r8, 0x0, 0x0) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)="788c90ce535f7fbef3490a74c6418cb457bef333bcd996c549aa182f198df8e83edc904b47cb927a739d82c96885ced77ee46093189a73126e9943060b6a057ae1ac4c07e5c01e07639b166fba1680d8ad8073ff6acfabe12b9f534b74116d298cca23e822642eade5e9b640d2cf13e2573c5561e84567be87903d32dc1f6f56afcbc086bdb1795fd1e94e9a705e80d6ff8c94c591dca421", 0x98, r9) keyctl$unlink(0x9, r8, r10) wait4(0x0, 0x0, 0x0, 0x0) 14:10:27 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1e, 0x8000) 14:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163f0ffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xe00) 14:10:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630e00000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0xfc03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000600)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="2100000000000000000001001f0008000100", @ANYRES32=r3, @ANYBLOB="3c000280"], 0x58}, 0x1, 0x0, 0x0, 0x84004}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r4, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x800) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) ioctl$TIOCMGET(r5, 0x5415, &(0x7f0000000140)) r6 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x20) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725", 0xbf, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r7, r7}, &(0x7f0000000480)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'wp256-generic\x00'}}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000005c0)={'bridge_slave_0\x00', 0x401}) keyctl$update(0x2, r8, 0x0, 0x0) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)="788c90ce535f7fbef3490a74c6418cb457bef333bcd996c549aa182f198df8e83edc904b47cb927a739d82c96885ced77ee46093189a73126e9943060b6a057ae1ac4c07e5c01e07639b166fba1680d8ad8073ff6acfabe12b9f534b74116d298cca23e822642eade5e9b640d2cf13e2573c5561e84567be87903d32dc1f6f56afcbc086bdb1795fd1e94e9a705e80d6ff8c94c591dca421", 0x98, r9) keyctl$unlink(0x9, r8, r10) wait4(0x0, 0x0, 0x0, 0x0) 14:10:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630f00000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163f5ffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xf00) 14:10:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000600)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="2100000000000000000001001f0008000100", @ANYRES32=r3, @ANYBLOB="3c000280"], 0x58}, 0x1, 0x0, 0x0, 0x84004}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r4, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x800) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) ioctl$TIOCMGET(r5, 0x5415, &(0x7f0000000140)) r6 = gettid() socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x20) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725", 0xbf, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r8, r7, r7}, &(0x7f0000000480)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'wp256-generic\x00'}}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000005c0)={'bridge_slave_0\x00', 0x401}) keyctl$update(0x2, r8, 0x0, 0x0) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r9) r10 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)="788c90ce535f7fbef3490a74c6418cb457bef333bcd996c549aa182f198df8e83edc904b47cb927a739d82c96885ced77ee46093189a73126e9943060b6a057ae1ac4c07e5c01e07639b166fba1680d8ad8073ff6acfabe12b9f534b74116d298cca23e822642eade5e9b640d2cf13e2573c5561e84567be87903d32dc1f6f56afcbc086bdb1795fd1e94e9a705e80d6ff8c94c591dca421", 0x98, r9) keyctl$unlink(0x9, r8, r10) wait4(0x0, 0x0, 0x0, 0x0) 14:10:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fcffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 804.238543][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 804.238567][ T26] audit: type=1804 audit(1580739028.523:651): pid=599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/586/bus" dev="sda1" ino=17289 res=1 [ 804.302204][ T26] audit: type=1804 audit(1580739028.593:652): pid=605 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/586/bus" dev="sda1" ino=17289 res=1 14:10:28 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x21, 0x8000) 14:10:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61636000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:28 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x5865) 14:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000400000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:28 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f0000000240)=@xdp, &(0x7f0000000380)=0x80) write$binfmt_aout(r0, &(0x7f0000000940)={{0xcc, 0x8, 0x2, 0x305, 0x255, 0x4, 0x25b, 0x2}, "32651d8bbb3643ed76cd8956f0ee13e7a7ba321018da73b972518c55c08291f75a09092abf31c8663d56f11081cc72c41f08a206b39ddf3f5a04b272d929df54a6428899b71e3ca1537fe34b6b3da32e2464cf832b462f8e68cf649524d41aa1b9251ddc8fb4297a763b244143f8770fc4ae026cc54556b739ca957c85f885dfeee549a2b0fecec9f2efd3e296288734dbe05c1f167f0d47958c2faa0b7c5a861ce9503bd1223910b204dc06cf50e21c4a8e1aa9724149a407d02466378ef9e4c9b75c47996ad108acbd24fc465ebdb32629b0c6918fd1773a988c6f51cd935285417cece9fb37ec61a8a62f835d7f9f55", [[], [], [], [], [], [], [], [], [], []]}, 0xb11) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$netlink(0x10, 0x3, 0x6) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r4, 0x0) getuid() r5 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x241, 0x0) ioctl$TCSBRK(r6, 0x5409, 0x1000) mount$9p_unix(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1402, &(0x7f0000000200)={'trans=unix,', {[{@mmap='mmap'}, {@posixacl='posixacl'}]}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00082cbd7000ffdbdf25010000001927061e03000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4004041}, 0x40840) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 804.327475][ T26] audit: type=1804 audit(1580739028.593:653): pid=728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/586/bus" dev="sda1" ino=17289 res=1 [ 804.444814][ T736] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630201000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000003000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 804.498868][ T26] audit: type=1804 audit(1580739028.783:654): pid=741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/587/bus" dev="sda1" ino=17291 res=1 14:10:28 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x14, 0x8000) 14:10:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6000) [ 804.641092][ T26] audit: type=1804 audit(1580739028.933:655): pid=744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/587/bus" dev="sda1" ino=17291 res=1 14:10:29 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x4}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 804.762063][ T755] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630102000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 804.807498][ T26] audit: type=1804 audit(1580739029.093:656): pid=752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/301/bus" dev="sda1" ino=17295 res=1 [ 805.296029][ T26] audit: type=1804 audit(1580739029.583:657): pid=744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/587/bus" dev="sda1" ino=17291 res=1 14:10:29 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x22, 0x8000) 14:10:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630002000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:29 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x14, 0x8000) 14:10:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6558) 14:10:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630003000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:29 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x3f6}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 805.329221][ T26] audit: type=1804 audit(1580739029.613:658): pid=746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/587/bus" dev="sda1" ino=17291 res=1 [ 805.356857][ T26] audit: type=1804 audit(1580739029.623:659): pid=746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/587/bus" dev="sda1" ino=17291 res=1 [ 805.457143][ T26] audit: type=1804 audit(1580739029.743:660): pid=878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/588/bus" dev="sda1" ino=17292 res=1 14:10:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630003000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000a000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x3fa}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x8100) 14:10:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630004000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:30 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x14, 0x8000) 14:10:30 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x23, 0x8000) 14:10:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000e000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000a000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x3fc}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x34000) 14:10:30 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x21, 0x8000) 14:10:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000e000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000f000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x400300) 14:10:31 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x24, 0x8000) 14:10:31 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x2000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:31 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x21, 0x8000) 14:10:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000f000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630060000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x1000000) 14:10:31 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x4000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000105000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630060000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:31 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x25, 0x8000) 14:10:31 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x21, 0x8000) 14:10:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000020105000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300d3020005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x2000000) 14:10:31 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xf603}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000205000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000030005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:32 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x3000000) 14:10:32 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:32 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x26, 0x8000) 14:10:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000a0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000405000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x4000000) 14:10:32 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xfc03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:32 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000e0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6000000) 14:10:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000a05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x40000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:33 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x27, 0x8000) 14:10:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfa03}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000f0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x200000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xa000000) 14:10:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000f05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x26, 0x8000) 14:10:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000600005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000006005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xc000000) 14:10:33 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 809.687431][ T26] kauditd_printk_skb: 28 callbacks suppressed [ 809.687456][ T26] audit: type=1804 audit(1580739033.973:689): pid=1809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/310/bus" dev="sda1" ino=17213 res=1 [ 809.903050][ T26] audit: type=1804 audit(1580739034.193:690): pid=1779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/593/bus" dev="sda1" ino=17237 res=1 14:10:34 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x28, 0x8000) [ 809.971058][ T26] audit: type=1804 audit(1580739034.263:691): pid=1770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/593/bus" dev="sda1" ino=17237 res=1 14:10:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163ffffff9e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630002d30005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$netlink(0x10, 0x3, 0xd) r1 = socket$inet6(0xa, 0xa, 0xd3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef48004d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd61703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xfffffffffffffd22, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a40)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)=')\x00', r3}, 0x30) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000100)=r4) r5 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa3, 0x0, 0x0, 0x0, 0x60}, 0x2af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r5, 0x4004550c, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 14:10:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xe000000) [ 810.084385][ T26] audit: type=1804 audit(1580739034.293:692): pid=1779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/593/bus" dev="sda1" ino=17237 res=1 14:10:34 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x2000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000008000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fffffff005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 810.268969][ T26] audit: type=1804 audit(1580739034.563:693): pid=1939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/594/bus" dev="sda1" ino=17305 res=1 [ 810.381482][ T26] audit: type=1804 audit(1580739034.613:694): pid=2013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/594/bus" dev="sda1" ino=17305 res=1 14:10:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 14:10:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xf000000) [ 810.463968][ T2049] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:10:34 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x4000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000000000b000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 810.778952][ T2061] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 810.814249][ T2061] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 811.104334][ T26] audit: type=1804 audit(1580739035.393:695): pid=2013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/594/bus" dev="sda1" ino=17305 res=1 14:10:35 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x29, 0x8000) 14:10:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fffffff505000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 14:10:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000010000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x10000000) 14:10:35 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0x40000000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 811.132737][ T26] audit: type=1804 audit(1580739035.423:696): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/594/bus" dev="sda1" ino=17305 res=1 [ 811.157988][ T26] audit: type=1804 audit(1580739035.423:697): pid=2071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/594/bus" dev="sda1" ino=17305 res=1 [ 811.252501][ T26] audit: type=1804 audit(1580739035.543:698): pid=2079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/595/bus" dev="sda1" ino=17289 res=1 14:10:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fffffffc05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 811.301150][ T2080] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 811.336406][ T2080] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:35 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2a, 0x8000) 14:10:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:10:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000030000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x60000000) 14:10:35 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xf6030000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61637fffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 811.635770][ T2099] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:10:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000020005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x65580000) 14:10:36 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xfa030000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61639effffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000002060100000000000000000000000f000d000300686173683a6d61630000000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000030005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:36 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xfc030000}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163f0ffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000040005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:36 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x0, 0x8000) 14:10:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6f266fe5) 14:10:36 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2b, 0x8000) 14:10:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163f5ffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000a0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x81000000) 14:10:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163fcffffff05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000e0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:37 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x0, 0x8000) 14:10:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x88a8ffff) 14:10:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000400000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000f0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 813.438838][ T2277] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000600005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000003000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:38 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x0, 0x8000) 14:10:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x4, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:38 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2c, 0x8000) 14:10:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x9effffff) 14:10:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000d30205000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 813.977419][ T2405] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xe56f266f) 14:10:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630002000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3f6, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630003000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:38 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x0, 0x8000) 14:10:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xf0ffffff) 14:10:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000a05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3fa, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 814.931430][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 814.931455][ T26] audit: type=1804 audit(1580739039.223:718): pid=2436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/598/bus" dev="sda1" ino=17289 res=1 [ 814.982461][ T26] audit: type=1804 audit(1580739039.273:719): pid=2406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/598/bus" dev="sda1" ino=17289 res=1 14:10:39 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2d, 0x8000) 14:10:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630004000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xffffa888) 14:10:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x1000000000000000}, 0x0) [ 815.010186][ T26] audit: type=1804 audit(1580739039.273:720): pid=2657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/598/bus" dev="sda1" ino=17289 res=1 14:10:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3fc, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 815.103805][ T26] audit: type=1804 audit(1580739039.393:721): pid=2666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/599/bus" dev="sda1" ino=16897 res=1 14:10:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000f05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 815.216112][ T26] audit: type=1804 audit(1580739039.493:722): pid=2776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/599/bus" dev="sda1" ino=16897 res=1 14:10:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000a000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x1000000000000000}, 0x0) 14:10:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xffffff7f) 14:10:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000e000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 815.934991][ T26] audit: type=1804 audit(1580739040.223:723): pid=2776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/599/bus" dev="sda1" ino=16897 res=1 14:10:40 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2e, 0x8000) 14:10:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}, 0x1, 0x0, 0x1000000000000000}, 0x0) 14:10:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000006005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000f000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xffffff9e) 14:10:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x4000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 815.967676][ T26] audit: type=1804 audit(1580739040.253:724): pid=2780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/599/bus" dev="sda1" ino=16897 res=1 [ 815.993554][ T26] audit: type=1804 audit(1580739040.253:725): pid=2780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/599/bus" dev="sda1" ino=16897 res=1 14:10:40 executing program 3 (fault-call:7 fault-nth:0): r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:10:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000002d305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630060000005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 816.208424][ T26] audit: type=1804 audit(1580739040.493:726): pid=2923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/600/bus" dev="sda1" ino=16978 res=1 14:10:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0xf603, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 816.308932][ T26] audit: type=1804 audit(1580739040.593:727): pid=2925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/323/bus" dev="sda1" ino=16801 res=1 14:10:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xfffffff0) 14:10:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630002010005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:10:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000400000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0xfa03, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630001020005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2f, 0x8000) 14:10:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x40030000000000) [ 817.173430][ T3062] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000030005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x100000000000000) 14:10:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000003000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0xfc03, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:41 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) [ 817.487759][ T3189] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000205000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000a0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:41 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x30, 0x8000) 14:10:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x200000000000000) 14:10:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:42 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x40000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000e0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:42 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fcntl$dupfd(r1, 0x0, r0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) getdents(r4, &(0x7f0000000000)=""/86, 0x56) fallocate(r3, 0x8, 0x0, 0x8000) 14:10:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000405000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x300000000000000) 14:10:42 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x87, 0x8000) 14:10:42 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x200000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000a05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000f0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:42 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x80000, 0x125) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = accept(0xffffffffffffffff, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, &(0x7f0000000180)=0x80) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x8, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48005}, 0x4c010) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0xc0, 0x5be0], 0x2, 0x8, 0xf3, 0x7, 0x3, 0x30000, 0xd6a2, {0x1000, 0x1, 0x7, 0x400, 0x1, 0xfff8, 0x5, 0x3, 0x4, 0x5, 0x3f, 0x8000, 0x8, 0xffffffff, "42ee6d6023185aef0a4b86353c1798146a7382ee29be23655fea5f8ed7f04b42"}}) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20083, 0x0) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) 14:10:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000600005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x1000000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x400000000000000) 14:10:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000008000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000f05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2000000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 819.104832][ T3620] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 14:10:43 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x88, 0x8000) 14:10:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000000000b000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000006005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:43 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x8, 0xb, 0x11}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22150240}, 0xc, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r5, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x5c010}, 0x40000a4) sendmsg$NLBL_MGMT_C_REMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, r5, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x35}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="dbe1f878bb299739b14257af3cf81934"}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x4}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}]}, 0x64}, 0x1, 0x0, 0x0, 0x8}, 0x5) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r6, 0x8, 0x0, 0x8000) 14:10:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x600000000000000) 14:10:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x4000000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 819.487873][ T3638] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 819.521129][ T3638] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000000000b000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xa00000000000000) 14:10:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x40000000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000010000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:44 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) creat(&(0x7f0000000340)='./bus\x00', 0x0) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) fallocate(r4, 0x12, 0x1, 0x8800) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) [ 819.775404][ T3750] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 819.834495][ T3754] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 819.853017][ T3750] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 819.857772][ T3754] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000030000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 820.093121][ T3784] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 820.377245][ T26] kauditd_printk_skb: 23 callbacks suppressed [ 820.377322][ T26] audit: type=1804 audit(1580739044.663:751): pid=3745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/604/bus" dev="sda1" ino=17346 res=1 14:10:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xc00000000000000) 14:10:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000030000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0xf6030000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000003000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:44 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xaf, 0x8000) 14:10:44 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x808) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x2040, 0x2) [ 820.425687][ T26] audit: type=1804 audit(1580739044.713:752): pid=3879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/604/bus" dev="sda1" ino=17346 res=1 [ 820.451734][ T26] audit: type=1804 audit(1580739044.713:753): pid=3880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/604/bus" dev="sda1" ino=17346 res=1 [ 820.555927][ T3890] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 820.568586][ T3889] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 820.585892][ T26] audit: type=1804 audit(1580739044.873:754): pid=3886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/330/bus" dev="sda1" ino=17342 res=1 14:10:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000020005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xe00000000000000) 14:10:45 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0xfa030000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 820.672308][ T26] audit: type=1804 audit(1580739044.963:755): pid=3894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/605/bus" dev="sda1" ino=17365 res=1 14:10:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000008000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 820.794205][ T26] audit: type=1804 audit(1580739045.083:756): pid=3996 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/605/bus" dev="sda1" ino=17365 res=1 14:10:45 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0xf8) fallocate(r2, 0x8, 0x0, 0x8000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000040)={0x3, 'veth1_virt_wifi\x00', {0x40}, 0x3}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@loopback, 0x53, r5}) [ 820.976416][ T4009] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:10:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000030005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 821.087606][ T26] audit: type=1804 audit(1580739045.373:757): pid=4015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/331/bus" dev="sda1" ino=16753 res=1 14:10:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xf00000000000000) 14:10:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000000000b000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:45 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0xfc030000, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000040005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 821.382887][ T4127] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 821.414313][ T4127] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 821.559149][ T26] audit: type=1804 audit(1580739045.853:758): pid=3996 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/605/bus" dev="sda1" ino=17365 res=1 [ 821.687532][ T26] audit: type=1804 audit(1580739045.973:759): pid=4135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/605/bus" dev="sda1" ino=17365 res=1 14:10:46 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xb0, 0x8000) 14:10:46 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:10:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000010000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x1000000000000000) 14:10:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000a0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x10, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 821.762174][ T26] audit: type=1804 audit(1580739046.033:760): pid=4000 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/605/bus" dev="sda1" ino=17365 res=1 [ 821.833637][ T4141] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 821.842912][ T4141] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000030000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000e0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6000000000000000) 14:10:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x300, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 822.092506][ T4258] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:10:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005020000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:46 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000040)) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000000)={0x1, 0x8, [{0x9, 0x0, 0x69}]}) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r6, 0x0) r7 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r7, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) r9 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r9, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r10, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r9, 0xc0286405, &(0x7f0000000600)={0x81, 0x400, {0xffffffffffffffff}, {r10}, 0x0, 0x9}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6, 0x3, &(0x7f0000000440)=[{&(0x7f0000000100)="adf70f3c7d902e445ec0abbd39a4ffa2bc9d7c74606154389a729bd02a2d5d9ae516377fddc8ac1e2d267904204fabe8c5ad4fe6c522d68ce42480271ef87e566c4eda07695646e1961bf8f58fedb6675fb602971363200e10e9edcdcdd4b6f4c6c1ecc040a0930d1c8453013b31fea087041c601df15f70dd445c7a890b6236af9210782dfef71f8823a92a2ca4fe555ddf311ef6098db67a4b2e2accb6568fe15aa34ac4b2749c459baf3ac5f119045646c7c0ab95845bfc04b1283bda201e5a79cc4aca2f1866a654f21666cad17af77b2c9b", 0xd4, 0x2115}, {&(0x7f0000000200)="3e96b6cf9bb89b0ab3974408fcbb01d5d0cbc20bd919289bc0406ffd61aae3868b4e11fe196abbf35eb062a55ccb300c71b0357a38a8ac39842920ecee04c16beb3c51641b3c605b46b9d83f1ef3058ba1c7bd6ba7a8c16982a4d613c55bb452968b02b343a0368d678044c3a9a8e05f2ac98157f9de5d2ea77e80af651a86d3778e5b4e76b4fa668fae295be89e81d636e78a0b10202016f809dd162bb0227d3d49bca48b5bf8936957113208999fa1fe3aff8fca858b390b5a8b270faaa032c94c3376b79392b059c8", 0xca, 0xfffffffffffffffa}, {&(0x7f0000000380)="e1ba868d5604eba8949b9b464f194ad7c7924fbde36e22475cb958ec4de15efa997fa9d9262d72f4608d3a603b122ca24c7bb1ac803d550f71b6e0f1788976a059793d4171421801e284f54695ecc6f6f32c9e34372d371198ddde79258e13f81a74849458fcdeb33639eb98c090a328b4cb8e14db6e63a472c9d9fc89454b2e7ae687589e507380682aef7b717a536b9d", 0x91, 0xa64}], 0x40002, &(0x7f00000007c0)={[{@uid={'uid', 0x3d, r5}}, {@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@uid={'uid', 0x3d, r6}}, {@type={'type', 0x3d, "60e9c6ad"}}], [{@euid_lt={'euid<', r8}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r11}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) [ 822.431385][ T4273] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:47 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xf1, 0x8000) 14:10:47 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r2}, 0x14) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x800, 0x0) r6 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r6, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x36, "5878fc10a31c4b5aba38662c061296aa3bb80e12d532f4167042abfb9aecb43e08aff14d34aae0addbd027200b2709943cfdcfccd904"}, &(0x7f0000000100)=0x3e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000140)={r7}, &(0x7f0000000180)=0x8) fallocate(r4, 0x8, 0x0, 0x8000) 14:10:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000f0005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6558000000000000) 14:10:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1002, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005030000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 822.892015][ T4386] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005040000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000600005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x6f266fe500000000) 14:10:47 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0xffffffff) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r4, 0x400, 0x70bd27, 0x25dfdbff, {{}, {}, {0x18, 0x17, {0x1f, 0xfffffffa, @l2={'eth', 0x3a, 'rose0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r5, 0x8, 0x0, 0x8000) [ 823.142489][ T4497] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1004, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005050000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 823.430630][ T4513] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:48 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x300, 0x8000) 14:10:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000020105000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x8100000000000000) 14:10:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1400, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005060000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:48 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @descriptor="a1b43a2e3ea5756d"}}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:10:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000010205000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 823.915507][ T4630] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005070000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x2000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x88a8ffff00000000) [ 824.167971][ T4743] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:48 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x500, 0x8000) 14:10:48 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) pipe(&(0x7f0000000040)) fallocate(r2, 0x8, 0x0, 0x8000) 14:10:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005080000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x300c00, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000a05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 824.478424][ T4761] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x9effffff00000000) 14:10:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005090000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:49 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x6) openat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', 0x460880, 0x2) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) [ 824.843966][ T4875] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x10000000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 825.112525][ T4976] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:49 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x600, 0x8000) 14:10:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000f05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xf0ffffff00000000) 14:10:49 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x282000, 0x0) setsockopt$ax25_int(r3, 0x101, 0x8, &(0x7f0000000100)=0x1ff, 0x4) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{}, {}, {@none}, {@none}, {@none}, {@none}]}) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r5, &(0x7f0000000340)={0x7}, 0x7) ioctl$KDSKBLED(r5, 0x4b65, 0x9) fallocate(r4, 0x8, 0x0, 0x8000) 14:10:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 825.447424][ T5004] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 825.478308][ T26] kauditd_printk_skb: 25 callbacks suppressed 14:10:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000006005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 825.478331][ T26] audit: type=1804 audit(1580739049.763:786): pid=5006 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/339/bus" dev="sda1" ino=16882 res=1 14:10:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 825.594783][ T26] audit: type=1804 audit(1580739049.823:787): pid=5008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/610/bus" dev="sda1" ino=16945 res=1 14:10:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x2, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xffffff7f00000000) 14:10:50 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000000)=0x6) fcntl$getown(r1, 0x9) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) [ 825.739851][ T26] audit: type=1804 audit(1580739049.873:788): pid=5087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/610/bus" dev="sda1" ino=16945 res=1 14:10:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000400000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 826.304809][ T26] audit: type=1804 audit(1580739050.593:789): pid=5087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/610/bus" dev="sda1" ino=16945 res=1 14:10:50 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x700, 0x8000) 14:10:50 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x4, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000003000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:50 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap$usbfs(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x5, 0x12, r0, 0x8) r1 = open(&(0x7f0000000040)='./bus\x00', 0x3a243, 0x1b3) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/vmallocinfo\x00', 0x0, 0x0) write$P9_RWSTAT(r4, &(0x7f0000000140)={0x2, 0x7f, 0xfffa}, 0xffffffffffffffc3) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r5, 0x8, 0x0, 0x8000) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000000)=0x5, 0x4) 14:10:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0xffffffff00000000) [ 826.343361][ T26] audit: type=1804 audit(1580739050.633:790): pid=5008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/610/bus" dev="sda1" ino=16945 res=1 [ 826.371313][ T26] audit: type=1804 audit(1580739050.633:791): pid=5113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/610/bus" dev="sda1" ino=16945 res=1 14:10:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000205000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 826.594043][ T26] audit: type=1804 audit(1580739050.883:792): pid=5296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/611/bus" dev="sda1" ino=16706 res=1 14:10:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000305000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x3f6, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 826.693297][ T26] audit: type=1804 audit(1580739050.953:793): pid=5355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/611/bus" dev="sda1" ino=16706 res=1 14:10:51 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x44) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x7, 0x6, 0x101, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x1ff}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x4c}}, 0x80) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) 14:10:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 826.773541][ T26] audit: type=1804 audit(1580739050.983:794): pid=5355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/611/bus" dev="sda1" ino=16706 res=1 14:10:51 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x900, 0x8000) 14:10:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f00000002c0)={0x2, 0x4008, "bd354e881b6b52ea75bff7a017c4a618cd4f43170fffb42d", {0x9, 0x7f20}, 0xa000000}) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0x42, "1d94e6736ae9df72e9f3c534a04f9fdf7758c3685b1977498841f0a3e1396d96ace1c96f58ba5617769d50fd096f191fc1931e516659792a3fb635744842d6091c6c"}, &(0x7f0000000240)=0x4a) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e21, @rand_addr=0x1}}}, 0x84) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) socket$inet6(0xa, 0x6, 0xff) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) [ 826.965585][ T26] audit: type=1804 audit(1580739050.983:795): pid=5355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/611/bus" dev="sda1" ino=16706 res=1 14:10:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000405000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005100000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x3fa, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) dup3(r2, r3, 0x80000) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000001a00000227bd7000ffdbdf251c202009ff04fd000037000005001a00b90000001400120008000f71f31d984200000000000000d2"], 0x38}, 0x1, 0x0, 0x0, 0x20000010}, 0x4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r7 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r7, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$inet6(r7, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000640)="5b45542b90963243dfcc005b42e5ea", 0xf}], 0x1}, 0x24000004) write$P9_RWSTAT(r6, &(0x7f0000000340)={0x7}, 0x7) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x148, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_LINK={0xb0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1605}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd47}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x594}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x392b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa763}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4c3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800e4867d2c011b000040000000000007000000", @ANYRES32=r4, @ANYBLOB="000000000a000200aaaaaaaaaa000000"], 0x28}}, 0x0) 14:10:51 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:10:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000a05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:51 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xa00, 0x8000) 14:10:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005110000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="19000200"], 0x28}}, 0x0) 14:10:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x3fc, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000e05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 827.724064][ T5598] __nla_validate_parse: 7 callbacks suppressed [ 827.724078][ T5598] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000f05000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005120000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 827.884113][ T5619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 827.915646][ T5619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:10:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:10:52 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x2000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 828.155869][ T5627] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000006005000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005130000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 828.406279][ T5639] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000000000b000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 828.643392][ T5644] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 828.693912][ T5644] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:53 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xb00, 0x8000) 14:10:53 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x4000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) bind$isdn_base(r1, &(0x7f0000000140)={0x22, 0x0, 0xd1, 0x1, 0x7}, 0x6) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0x10, 0x800, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c4eb5d4856941c9fd617a7d1bd33083b3d7e251fc4fbfeff5e9d25604573f679835716b6f351e412d1ecad957f8e5990c8a7ff5da2422034f8761223643aa36c50fc938cf029ae78f3e752c5ccb2a7f42f346647fe27d7eb04c5ef82d1cc78c36c290b5fe142f564471b3423ec4cbf72a53b12ff900912bd4a4e0c72aa254f1eea8d294ddc9e0a6a84a506d8cc9e252907b94f469f134eb40f37d3dacccb8337670ce77a93c3776a349438c0bb5e567bb2539309ecb8f12d933c28ba8368bc", @ANYPTR, @ANYRES32=0x0, @ANYRESDEC, @ANYRES16=r4], 0x5}}, 0x4) r5 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x1, 0x305001) r6 = socket$key(0xf, 0x3, 0x2) r7 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r7) keyctl$restrict_keyring(0x1d, r7, 0x0, &(0x7f0000000300)='security-,em1\x00') ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r6, 0x8983, &(0x7f0000000240)={0x1, 'ip6gre0\x00', {}, 0x9}) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:10:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005140000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000030000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 828.881057][ T5652] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 828.915967][ T5655] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 14:10:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005150000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000003000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 829.035955][ T5661] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x200488c4}, 0x20000000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, r4, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x48}, 0x1, 0x0, 0x0, 0x404a000}, 0x8000) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000a000200be309c29cfd61daa"], 0x28}}, 0x0) 14:10:53 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0xf603, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 829.179084][ T5666] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005160000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000008000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 829.458746][ T5677] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 829.594947][ T5680] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 14:10:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005170000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:54 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xc00, 0x8000) 14:10:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d6163000000000b000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r5, &(0x7f0000000340)={0x7}, 0x7) write$P9_RWALK(r5, &(0x7f0000000380)={0x64, 0x6f, 0x2, {0x7, [{0x4, 0x3, 0x5}, {0x2, 0x2, 0x3}, {0x40, 0x4, 0x1}, {0x2, 0x0, 0x2}, {0x0, 0x4, 0x4}, {0x10, 0x2, 0x3}, {0x10, 0x4, 0x3}]}}, 0x64) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x34, 0x0, 0x8, 0x3, 0x0, 0x0, {0x2, 0x0, 0x9}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xc5}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c094}, 0x40004) 14:10:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005180000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:54 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0xfa03, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 830.183518][ T5696] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 14:10:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005190000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000010000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:54 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0xfc03, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 830.490367][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 830.490464][ T26] audit: type=1804 audit(1580739054.783:811): pid=5706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/615/bus" dev="sda1" ino=17265 res=1 14:10:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 830.592231][ T5709] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 14:10:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000030000400000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x40000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 830.956683][ T5719] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 831.377558][ T26] audit: type=1804 audit(1580739055.663:812): pid=5706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/615/bus" dev="sda1" ino=17265 res=1 [ 831.431095][ T26] audit: type=1804 audit(1580739055.713:813): pid=5728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/615/bus" dev="sda1" ino=17265 res=1 14:10:55 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xd00, 0x8000) [ 831.461603][ T26] audit: type=1804 audit(1580739055.723:814): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/615/bus" dev="sda1" ino=17265 res=1 14:10:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005020000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00') r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) getsockname$packet(r3, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14) r5 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000002000)={'xfrm0\x00', r8}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r12}}, 0x20}}, 0x0) r13 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r13, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_mreqn(r13, 0x0, 0x23, &(0x7f0000002080)={@dev, @remote, 0x0}, &(0x7f00000020c0)=0xc) r15 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r16 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r17 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r17, &(0x7f0000000340)={0x7}, 0x7) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x57) sendmsg$nl_route(r15, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r18}}, 0x20}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000027c0)={0x11, 0x0, 0x0}, &(0x7f0000002800)=0x14) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000002a80)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002a40)={&(0x7f0000002840)={0x1fc, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x124, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_STRSET_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r18}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r19}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}]}, 0x1fc}}, 0x20044000) r20 = socket(0x10, 0x803, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x5}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r21}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000140)={0x593, 0x6, 0x4, 0x20000000, 0x854, {0x0, 0x7530}, {0x4, 0x1, 0x3f, 0x0, 0x6, 0x0, "b5aee11c"}, 0x2, 0x2, @fd, 0x0, 0x0, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r23, 0x28, &(0x7f00000001c0)}, 0x10) 14:10:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x200000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005030000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 831.666436][ T26] audit: type=1804 audit(1580739055.953:815): pid=5737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/616/bus" dev="sda1" ino=17409 res=1 14:10:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 831.858330][ T26] audit: type=1804 audit(1580739056.063:816): pid=5741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/616/bus" dev="sda1" ino=17409 res=1 14:10:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x1000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005040000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:56 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xe00, 0x8000) 14:10:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x22, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000340)={@mcast2, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8, 0x6, 0x1, 0x400, 0x8, 0x280, r4}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) [ 832.221520][ T26] audit: type=1804 audit(1580739056.513:817): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/617/bus" dev="sda1" ino=17329 res=1 14:10:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005050000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x2000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 832.405840][ T26] audit: type=1804 audit(1580739056.563:818): pid=5764 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/617/bus" dev="sda1" ino=17329 res=1 14:10:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005210000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005060000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:57 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x4000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005220000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 832.810170][ T5781] __nla_validate_parse: 15 callbacks suppressed [ 832.810184][ T5781] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000240)) [ 832.957024][ T5786] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005070000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005230000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 833.102038][ T26] audit: type=1804 audit(1580739057.393:819): pid=5764 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/617/bus" dev="sda1" ino=17329 res=1 [ 833.204151][ T5795] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 833.256057][ T26] audit: type=1804 audit(1580739057.443:820): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/617/bus" dev="sda1" ino=17329 res=1 14:10:57 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0xf00, 0x8000) 14:10:57 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x40000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) r4 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r5, &(0x7f0000000340)={0x7}, 0x7) sendto$isdn(r5, &(0x7f0000000140)={0xff, 0x9, "d3be1f45"}, 0xc, 0x20040010, &(0x7f0000000240)={0x22, 0x4, 0x3f, 0xd7, 0x80}, 0x6) shmctl$SHM_STAT(r4, 0xd, &(0x7f00000002c0)=""/76) 14:10:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005080000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 833.378939][ T5799] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005240000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 833.539839][ T5809] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005090000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:58 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1100, 0x8000) 14:10:58 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0xf6030000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 833.775365][ T5820] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 833.780755][ T5819] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00000000000000002800120009000100766574680000000018000200140001efb3ee6933a0b0b213f8328a0000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64], @ANYBLOB="0000b20000000004"], 0x5}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="0000aa000700"], 0x28}}, 0x4000) 14:10:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005250000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 834.068988][ T5833] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 834.101868][ T5832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:10:58 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0xfa030000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 834.127794][ T5838] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:58 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1200, 0x8000) 14:10:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005260000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:58 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0xfc030000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005270000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005280000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005290000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000050f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005100000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:10:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:10:59 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1300, 0x8000) 14:11:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 835.753922][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 835.753988][ T26] audit: type=1804 audit(1580739060.043:835): pid=5892 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/621/bus" dev="sda1" ino=16502 res=1 14:11:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005110000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 835.853052][ T26] audit: type=1804 audit(1580739060.143:836): pid=5896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/621/bus" dev="sda1" ino=16502 res=1 14:11:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:00 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005120000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:00 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x3f6, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005130000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 836.777365][ T26] audit: type=1804 audit(1580739061.063:837): pid=5896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/621/bus" dev="sda1" ino=16502 res=1 [ 836.882282][ T26] audit: type=1804 audit(1580739061.173:838): pid=5925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/621/bus" dev="sda1" ino=16502 res=1 14:11:01 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1400, 0x8000) [ 836.934944][ T26] audit: type=1804 audit(1580739061.173:839): pid=5927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/621/bus" dev="sda1" ino=16502 res=1 14:11:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005140000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:01 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x3fa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 837.024584][ T26] audit: type=1804 audit(1580739061.313:840): pid=5930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/622/bus" dev="sda1" ino=17297 res=1 [ 837.130017][ T26] audit: type=1804 audit(1580739061.413:841): pid=5937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/622/bus" dev="sda1" ino=17297 res=1 14:11:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005300000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005150000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:01 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x3fc, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005160000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005310000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x2000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005170000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005320000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 837.896531][ T5959] __nla_validate_parse: 25 callbacks suppressed [ 837.896546][ T5959] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 837.918262][ T5961] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 838.028043][ T26] audit: type=1804 audit(1580739062.313:842): pid=5937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/622/bus" dev="sda1" ino=17297 res=1 14:11:02 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1500, 0x8000) 14:11:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x4000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005180000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005330000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 838.147817][ T26] audit: type=1804 audit(1580739062.433:843): pid=5964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/622/bus" dev="sda1" ino=17297 res=1 [ 838.227548][ T26] audit: type=1804 audit(1580739062.433:844): pid=5965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/622/bus" dev="sda1" ino=17297 res=1 [ 838.311815][ T5973] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 838.330110][ T5974] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0xf603, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005340000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:02 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1600, 0x8000) 14:11:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005190000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 838.635277][ T5983] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 838.665409][ T5985] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005350000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:03 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0xfa03, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 838.917237][ T5994] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 838.933521][ T5995] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:03 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1700, 0x8000) 14:11:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005360000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 839.182794][ T6004] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 839.245121][ T6006] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:03 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0xfc03, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005370000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:03 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1800, 0x8000) 14:11:03 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x40000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005380000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000051e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005210000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x200000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005390000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005220000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x1000000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005230000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 840.955610][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 840.955632][ T26] audit: type=1804 audit(1580739065.243:859): pid=6028 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/626/bus" dev="sda1" ino=16897 res=1 [ 841.044547][ T26] audit: type=1804 audit(1580739065.333:860): pid=6061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/626/bus" dev="sda1" ino=16897 res=1 14:11:05 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1900, 0x8000) [ 841.099752][ T26] audit: type=1804 audit(1580739065.363:861): pid=6063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/626/bus" dev="sda1" ino=16897 res=1 14:11:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005240000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x2000000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 841.268924][ T26] audit: type=1804 audit(1580739065.553:862): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/627/bus" dev="sda1" ino=17313 res=1 [ 841.338119][ T26] audit: type=1804 audit(1580739065.623:863): pid=6072 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/627/bus" dev="sda1" ino=17313 res=1 14:11:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005250000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x4000000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005260000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005410000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005270000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x40000000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 842.166069][ T26] audit: type=1804 audit(1580739066.453:864): pid=6072 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/627/bus" dev="sda1" ino=17313 res=1 [ 842.282380][ T26] audit: type=1804 audit(1580739066.573:865): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/627/bus" dev="sda1" ino=17313 res=1 [ 842.348887][ T26] audit: type=1804 audit(1580739066.613:866): pid=6098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/627/bus" dev="sda1" ino=17313 res=1 14:11:06 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1a00, 0x8000) 14:11:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005420000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005280000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0xf6030000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005290000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005430000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 842.628941][ T26] audit: type=1804 audit(1580739066.923:867): pid=6107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/628/bus" dev="sda1" ino=16486 res=1 [ 842.759734][ T26] audit: type=1804 audit(1580739067.013:868): pid=6110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/628/bus" dev="sda1" ino=16486 res=1 14:11:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0xfa030000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005440000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 843.050000][ T6121] __nla_validate_parse: 23 callbacks suppressed [ 843.050012][ T6121] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 843.094675][ T6123] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005450000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0xfc030000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 843.301886][ T6127] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 843.427038][ T6131] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:08 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1b00, 0x8000) 14:11:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005460000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:08 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 843.879425][ T6140] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 843.885928][ T6142] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005470000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 844.074564][ T6147] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:08 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 844.203468][ T6152] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005480000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 844.451377][ T6159] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:08 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 844.536419][ T6161] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005490000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000052f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:09 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1c00, 0x8000) 14:11:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:09 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005300000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005310000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:09 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005320000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:10 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 846.195571][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 846.195601][ T26] audit: type=1804 audit(1580739070.483:879): pid=6181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/630/bus" dev="sda1" ino=17437 res=1 [ 846.330370][ T26] audit: type=1804 audit(1580739070.623:880): pid=6177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/630/bus" dev="sda1" ino=17437 res=1 14:11:10 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1d00, 0x8000) 14:11:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005330000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 846.434381][ T26] audit: type=1804 audit(1580739070.653:881): pid=6209 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/630/bus" dev="sda1" ino=17437 res=1 14:11:10 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005340000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005500000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 846.638049][ T26] audit: type=1804 audit(1580739070.923:882): pid=6219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/631/bus" dev="sda1" ino=17439 res=1 [ 846.739866][ T26] audit: type=1804 audit(1580739071.033:883): pid=6221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/631/bus" dev="sda1" ino=17439 res=1 14:11:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005350000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005510000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005360000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005520000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 847.559641][ T26] audit: type=1804 audit(1580739071.853:884): pid=6221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/631/bus" dev="sda1" ino=17439 res=1 [ 847.688706][ T26] audit: type=1804 audit(1580739071.973:885): pid=6248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/631/bus" dev="sda1" ino=17439 res=1 14:11:12 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1e00, 0x8000) [ 847.772212][ T26] audit: type=1804 audit(1580739071.973:886): pid=6250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/631/bus" dev="sda1" ino=17439 res=1 14:11:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005370000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005530000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 847.946298][ T26] audit: type=1804 audit(1580739072.233:887): pid=6256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/632/bus" dev="sda1" ino=17452 res=1 14:11:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005540000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 848.054728][ T26] audit: type=1804 audit(1580739072.323:888): pid=6260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/632/bus" dev="sda1" ino=17452 res=1 14:11:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005380000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 848.215121][ T6265] __nla_validate_parse: 20 callbacks suppressed [ 848.215136][ T6265] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 848.285566][ T6267] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005550000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005390000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 848.603987][ T6275] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 848.615122][ T6276] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005560000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 848.924548][ T6284] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 848.960636][ T6285] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:13 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x1f00, 0x8000) 14:11:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005570000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 849.320991][ T6295] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 849.332233][ T6293] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005580000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 849.616959][ T6303] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 849.624986][ T6304] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005590000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:14 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000053e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:14 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2000, 0x8000) 14:11:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:14 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005410000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005420000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2100, 0x8000) 14:11:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005430000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8001, 0x0, 0x0, 0x1000}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f00000000c0)={0x80000001, r5, 0x10001, 0x5}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000040)={0x2, 0x1, 0x1, 0x8, r6}) 14:11:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005440000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:15 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r3 = socket$inet6(0x10, 0x2, 0x14) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000040)) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005450000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 851.653446][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 851.653491][ T26] audit: type=1804 audit(1580739075.943:904): pid=6468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/345/bus" dev="sda1" ino=17436 res=1 14:11:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 852.070489][ T26] audit: type=1804 audit(1580739076.363:905): pid=6355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/635/bus" dev="sda1" ino=17412 res=1 [ 852.191216][ T26] audit: type=1804 audit(1580739076.483:906): pid=6581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/635/bus" dev="sda1" ino=17412 res=1 14:11:16 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2200, 0x8000) 14:11:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005600000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:16 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004081}, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000000)={0xffffffff, 0x40}) sendfile(r0, r1, 0x0, 0x8400fffffffa) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200), 0x6000) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) r4 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7ff}, 0x8) 14:11:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005460000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 852.418597][ T26] audit: type=1804 audit(1580739076.703:907): pid=6592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/636/bus" dev="sda1" ino=17462 res=1 [ 852.524303][ T26] audit: type=1804 audit(1580739076.753:908): pid=6594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/346/bus" dev="sda1" ino=17471 res=1 14:11:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005610000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 852.627287][ T26] audit: type=1804 audit(1580739076.803:909): pid=6595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/636/bus" dev="sda1" ino=17462 res=1 14:11:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 852.744260][ T26] audit: type=1804 audit(1580739076.893:910): pid=6595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/636/bus" dev="sda1" ino=17462 res=1 14:11:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005620000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:17 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2300, 0x8000) 14:11:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005470000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 852.801339][ T26] audit: type=1804 audit(1580739076.903:911): pid=6595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/636/bus" dev="sda1" ino=17462 res=1 14:11:17 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:17 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 852.964220][ T26] audit: type=1804 audit(1580739077.253:912): pid=6710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/637/bus" dev="sda1" ino=17478 res=1 14:11:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005480000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 853.078945][ T26] audit: type=1804 audit(1580739077.323:913): pid=6713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/637/bus" dev="sda1" ino=17478 res=1 14:11:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005630000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 853.232690][ T6821] __nla_validate_parse: 19 callbacks suppressed [ 853.232705][ T6821] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 853.323718][ T6825] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:17 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syncfs(r2) lseek(r0, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'wireguard1\x00', {}, 0xfff7}) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r4, 0x8, 0x0, 0x8000) 14:11:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005640000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005490000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:17 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 853.614062][ T6833] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 853.625882][ T6834] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005650000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 853.864705][ T6939] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 853.926296][ T6942] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:18 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2400, 0x8000) 14:11:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:18 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x80000001) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x80, 0x0) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', r6}) sendmsg$xdp(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x2c, 0x2, r7, 0x26}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="1e17345285a93890992923c2aa36fc5bf0cc1dcd6a9fe199820437ce88917b236a6553ea50a51be2997b336b89374bbd1d5c39575993c4bab7e1466ed78c4886497e70955ab24dab0de379ea6259f917059935dd48a831e49af1292cd0e2f45d6d80e69b5c7e22057a4000fc8eb10fb797206ea16c17b6c408b7b0ba6f8a3a8f792ec10aafc1e305c2253d9afe8df0424f13f86c7dfd011d7c80412f2d126a39afe546614951af09992a9cc1448286bd0065851398f5e1695d506ca7a62bac279eda26af2a735c503ecb02a4aacc6ba9849d", 0xd2}, {&(0x7f00000006c0)="dba4e16548243f7598514e2ab21b2110a372968edcd7e6acae1a32610702240d3d2c0309ad2813e3c3550ff6a21341c38e2c822d686ea5ce697a7b74e4c2e80aeb919df9b8db73fb1236324127d7d3dcda6c11865e22af6d2850bcc17557b775b4a8b77337d953ad96e58d1def69d7ca37fc010480e30d5e1c59e9473578199ef0a6e690ec904f9f9fb8dffa875ef4225935c19960797fc49c38b52d52bc9c71f70e149000fb755ec7673f0e5ffb86edf4a3e611bf6f50d6b8fa78762c9bcb7c2f9d72fd2d05c6304b3588aaed2f6d25f5e5a92d6dd6d86e0ede46a0fedd3d10f99b9e677da1a32a98af6e34acbfc6174e2d86acd3bdef2301aeebb207708376067ffb34c478951126781fd69de68e26e9f731e5331209bfb9bdc552b4537bc3fe0dc37a4ec305df0a534c4f946729d7e3ead6e2d0dd4df6bf4361f6c969d325d7a170fefa7fffb74aab67434aa3562ecf80519d332c71454144dfdd370d062e70270145856ae3d98370c116b1ee892bb5516e660650b90a5f5b64c919858c5c3f5a3fd72cfe37530def77017c88fec3d7803f0fb3ae3b869bfba8ac1754c99404f3b8c5d12f021140bfa31b803c0c428cd9a790c46b84aca985859b48b65519b2af5ac8572d46dd1f3f43f6e7c1f67ec9daab567617681f2a623b21e0cb781657da809b579aa7ba626b4cc687993abb33ff16df687a2f553950478ea34d2bddce12363e5c8e2d7a5d90271a741220445a0c4221725e76220169c833cf0a648b280673b12662401b2af26dab98169ccd7308a7ee160f078766c754b1d4a7ff1eb94c47264e788479a3e7e23b1d7893468228df3c019e29cb22f3300461a63632d2b0e699c172a10a97906f91f9591ea9a107b6dd1d6b1691f4b6d2c819d6fbc758b95b1b8e1a337d5f6e5206dc5b491b89c288a745d2cda0ce89635cc36592e9557579f7eb27aa4dbdce3dd084ea31a301167916e8809d2b61fc81197338b2c0ea434ddf6917191a9236a3750520818c16b3b3dbab648c63370886796f0160e624b06a97e7c6b708d7095dc280d4eed14c1973e014d65e43f318999e83230a32ca478f16daddd8f7bd785fa68a293b2080b423f5adad64e574d50753b5408e4fe1cd0a6f27388ec1588a13b5623d305971d234e188fed04ef971936b89d52796681270248fb939a037d4fc00719bbf4d4b3ff81ae43e9b85278e99eaaca0ef9ac67d5ca4b496b04f4342c9ceebefcd1f2904951aaccb325bc75de224e5741d1cb7658104a0224b20e44005673042addfb12f9b2cf9dc11f3c1c1651b70af8120bcf9c18226448a174c35cdaeff1a93616aa613ac235c6dec929cab74dd8a19a2cb025bfe81cb59209c23133307fd64671259a9532f23227876f6ffbcfa927cc0e6558ae0dae3b89a52af0a02016dc4386663bf1d46224c520380b674174a69f2c404de441016e79e02963419db8f65970c71d854825f8a817c4214a75cdf43edcfdb7d7b23f48b8424b8ccee15abbe58298d2380868f58b92493abf481da548833f26d8b7b2fb933ba46381a05c4915a957ef1d89ebe0f72f07e639f4e9d788d60827d55a812b8f9164fa80efccde449a7089fcf022bb9b2b90b7699d84f7bf5269db6bb7dece75c4d35087a3a814190255e539714a8aab1e839f1da0f2f60662bf855eaa47d56b4daa3fd829403f603489c35c2214f10ac0b7d3a2e54354c65115040d51fc567047c022ea5cefb34baaa82e0786a975c4dd66eec2c0902c4bc206e75386e63a081e7c8fddc1743ad05836ffdd0b2a7848623b60bcd67945719addf5baa45f1700a2040503a5f49ed6a083e1ac6c4ad42499b83afa8528e5050da5950426c9b791cb820b71ac7dd6c5aa183b629e0af57c28dab313bef7591e20894250a473d9730c382562cc96faca0a1a7d38162da73ad4c53e5bb3e0ff65ba22595ccb677b6cceb4f24eec989bdf84284772b030df72ccf1da35d4e8a1cc616b177c60891ed113cccc1d8d608a8ecc85a7e3eba4e3be1cde1a092506117aaa39582e3514e48e186e43a6375ce7daca624133a2840037e42748da923839ebc81a540ea59d19f54efd44b251d2155756aa76beda051202e615e261319eb18eb1f2b86809bb5b8418ddcd61c6eb7e176ebbc9a6e15805761424ce36e8c99646aff44f123153cbfd1bcf0650ae7fbf5c1c0c08c7e07b2dd03a6ccb52ec578ecb96d643d9c921dcdde6caeb6b6a6b6f563a984ad80658e14f013b7ddb2ac449e53b02c63910c984aaa7197ad33a9b4aef746c7b16c2d94909bb179f66e76326170a480ebe3984a787543806dc14ba4a602cc7a7a172b40f8330e00f781cd0d778dd3c0ff9b1f8f911ce59b0cb8090ce246533a32fe55604a12a5e8c042b32a91dcde35e6fa6e7381f62705fba556e1bcad29956e21a260c13960ea848800ed5cdd2e247abc4ce03919cdeb82897607cd45c52074431512835860656e237498177b132063e8d987ae6e646ad960955b7b3d4973c39b284666a17a7fb6e54ccf1e0d6e41a63fec6b3431053fcf7872829cac073507137325e9ca4ef61fb940336107120095ab446eb75905d5728329f933963b4ddda733ee6ba44c59dac0b96a7316d11ebd1be40610fbb91194f5f55a4a21c2adfc1639901f6d617d6415c700cd5bd7a172f75d9d9eb1db01b455b8649c6aafbf47b090da9313f9f329bf4f9bf4815b1dbde6b3a55db053c61abf5f396719108ae9e04a77511ec717d7fc2e9aefebda7844793ced910d94fb1489b260cb3283b1b749d4e120cd4a0cc03ab54c3c5ed3be622498582cad8884d84e12bee69f61a6507ec9440d08377149d11493cee4f73ce67cd40224bf25213e452c1c85dfd6925e1d3615687b4f05fc29c2ac051fd3cc5614e97128ed86b5e22bb4c97cc432827cce7fefe977a592e9f2fc103e1e52481f61e41279d99f9a1b3cdb95a9cbae7eed36fd649d18b82be98b6e42e552c2c2ce795cec30f980227549779be05ed36c8dd29b3c6853489d7f208e59c54966b3d11152f862db5ec6874c10bdc28e1c632079a93aa0447e902f79cea41e0aceec5bd9ce5eb900c2b0aacf7645ff9e06089e2274c79670683078c703fe8d1845731cf6789522c3b6754b80b0dc9135b28ce4720ecc8942878a6a8bbc13d16fb26f9450934d56644eb7cd0cde5c4e09d94dd68d65918b3bad7f06a55b8a4bba5f6141700d5b61f2a4442a52def7d9211e2a3a3cdd1f14c9a8e664f270bdf96415bd8ccd91b80c8f814baa520b7e5a2fb441edf975aaaa88d70b3de31810a6aae9ac3ec9afb908b762281c60f9c956033ec78b3574686bd93f0dbd8fd5f211bdeb1266c7bdabd20182928c7ee7ea802ec6865df7bfc38eab783608c11895a94fa079ab793ed06d6d921715f1a22a06cc7e6ec744373cc2b0d17d80c87f72c5d58fb20e64e86194a61af0145973013b5957ab948fc8390206599c70643ae95cd0bcc324832985c34f82fc256e224e204fc542895587980383401a8b12817e3868d62583420fac7d64433be022f0597d802ffa1f252b2761505878771ca7d3deaa2796338933c242de01c83f65dfc3a35b4448418ce75e7a29097b4058edcde2b49a63a4772a6e2da9c5bd7016523bf07c16cd0660aeb186569b4285609e48dd2ded16668651a157330daf5950a1feaf08513a2a080dbcc24029acf931f3c7ae4e4025436038982891fb7d53eaac5ad2e74f4a2f9ddd262622067ebc4f2bed0953fb1d9a4768e7b114605b62bc8a945adbd21c482a68284713007c0a1102e14858149ecfab57b016614aecba5c5d293d74537de80cc985794dd1037c829b5854fe1c2524f07cf8328329cfe6e8001a482f3d4a95bfbf91d80cec011db4c7e79886039653dc4de973614ac8669cd0440c54ccf69f2d7cb0f1fcf573b5afc70e634c6c8bd3ed83e42823010247ed61a771e4b2c6b9a851c933ab0f7a9043636cdce8cf603eba210922309e55fcf0357f0295407ed5b243b3b0b43430482c2a23aba3ecaa1e99ae0515d50d694e64bded51b67bc3a4cb18dddd05b31355b5daecb80e6992aa37636eaf668453ffd728cde9cd787b6121804d62d0776070c3a8a5bfe8a5db17c056e9b5a86db1d1c7cd851cbe94e81610f2136f881f9e3e7acc313f448710e5f8e371dfaa3b1ddc03db58e5871fa0d44314c28a556f087c8f4e6fe62986ba44a5b79b87fcdf5e81636c1c871a847a1ce4b40aa4abba3190ff7ea96ae9a9e8c3d38f2dff6b2301f3bfdfcdb417f5cadb8b19109a45dfca90e60e95199b06db5b878e11560bec09cd28b00268baf8001a9c2786ea82c0716781d7bd772ea7d64ae22d1418b5a835e8b29184bca12a59b6c552248d634a2a687e6f6de8d9bac3c0e55ec118f4f014523986a7a3da9d0cd049c10f556e4d8585f6389b98794caf4dd88d5bbcdecef27934797d47fd57aa1f9196dd97b9e2c4aceca50a8183311cf28c8fadf6288de877c2fe9822d5b5ab3cc672dc3f51eaf3127010aab30ad5fa6f68b24a467d3779eedf797c39917eb218f3b5a6b10856354ed0cb89a725ac63000cdc3c5386d3c2f328ea21573573b55822ccdebd8e7b9badac50756f82371fc185cb651e04071ced1b94d9853c05f2132cfbd741ffe72d12f5a02726c8b5c576323c2f72e4329a26ee104c096d19efe7240d085e280e688b6981050084e01cf196955a0a1451a65a689c1fedb5783c960973062004b6c5e9af9a290abf387e3603afc586d82bb1c638c27bc2b4d05af13d964fbd0e67a5c31948e9f4106570f9532ee93256719473e79da97f4a3f06589ea1c006cb585e35dda15566175e9664409bb80e360edeb5e16ba89fc10207ce363f40622a58d614a1e6a93c0f80d345eacb88b14dba3857cf5d61612ece79c588458f50f9918d2ec8cc318ba22428e97c62640c355c550c769db5571fa10e8480593e0ccbe643869ccea909fc118b76ae0b81862b404c637b326d34036b4e2fb4983bee3ea24597ba4dd41e0d4debeaf79ddb817c1dc431ee4e85af466989088af5c685e1edae2a755df6758f275d949ec095043e8790cbf885081f85fefd01a6a13905c445e2a6d9120708969d3b10263773714406a985c87d4e40008914094f13490b66a3bc97d5cedc17c98f2ce17f4fed5aa91734ce741cb1a4ec11800c21d9196cf2c8d8164ba515d7272189e886b3ba75af014111c7615df79070145cb665291b5861765d244f53815a85c3ec2cf75834523fab109b498984d91b501d06fa21f6fed3402f8f6af5dbaede1b5153e3016d1eec0ac2a846142fe34d43ba805af91eeffa0842b2811f38883b939a142e4f669ab35d058435f17fbfa74e51e88a4bd3701e52bc7326e67709fedbb6e1fedfb926b79125103786659cbf65df9f9d4ee4d8b26b94fd77f5ab5ba96996e5c6494c58a4e1d71497b52ce9457f80617d7e237fda353c1c6ef48a57a4c082cd0cbf3d0ce133fe3ab297440e88b1670cfe78735872189f25f0a417f6c5ff46457f862e3d00caaba721d84930b87650ef87ad166912a39d4f791d3584090317a27be42dbd992340b26a92ca5064b8935c8cd4be2c74ebf0abf16c1c2f0fa6180b7cec01470a27af1fa0110752b47601837cb5669cf803c458843d9ae94914a34cf02c7867934628cc39ea401bb436baf314eacdc67c21e863fdac2b8d79b284563868302cceafe9ad5a21e03b8f0ac9da55907abf70c8ffeb2e7100ff93ec381c703c988ea975211ad587154583c463fc704ed84ab3e55af242c22989", 0x1000}, {&(0x7f0000000380)="4104aa84402ebfe232b2cf144c6a2eeaef23d315339b2a7da5bea1b13e74bb2e8be203a963cc3db06f89a2f8f5a5d4741b08fafde05278ed4b0ed0a491fa72a905e87ff5901da406edaba0ea8080ce893c0c05681beb2a3f099e9768718e4d1511858cec9df9de9c225799a234820aaab8db81a9739f3ffc52ba7329688c74dfcacffd18c4d6f9b46efa316ca64318f62c548752a404a2fd7dfcb7db967e96f65070d75f7dd0c777e1092829ac6a56367d655c1f413fa991cee2111162a49cbc6dad8999cf088de949c1f43d9ba2d568e98054c091a32bd33900db7b66fe7c37c132", 0xe2}, {&(0x7f0000000280)="6a80634975b24a1b4fb1f3333e663b6bcfd9058c10b135f361d41747fede6cc454758ea00672a577cc802a3c3b22997f4970716451eb5850e00443183f8a6dc891a1afb2963d61598cc5a3b8d6b674c7b689b1d65500abf6d05cb673fac120b471788924d2736d64f7da124654cc58a7fcb1a17ee256fb94ea16b35085595d0cfdc33fd7becb80adf10eae928fa80cc6d236fa0a17e2f047f505d7b678198d8aa69d7aafeafe82b11af481dd4342558bdd751fa513122832a6", 0xb9}, {&(0x7f0000001880)="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", 0x1000}], 0x5, 0x0, 0x0, 0x20000000}, 0x62004800) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r8, 0x8, 0x0, 0x8000) 14:11:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005660000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 854.167711][ T6953] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005670000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 854.237117][ T6957] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:18 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'rose0\x00'}}, 0x1e) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x220082) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) [ 854.441935][ T7064] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 854.485404][ T7065] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005680000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:19 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2500, 0x8000) 14:11:19 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x2) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005690000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000054f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:19 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005500000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:20 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:20 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2600, 0x8000) 14:11:20 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) shmctl$IPC_INFO(r1, 0x3, 0x0) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x4000) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x10) sendfile(r0, r2, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) execve(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='nodev\x00', &(0x7f0000000080)='vboxnet0\x00'], &(0x7f0000000240)=[&(0x7f0000000100)='ppp1&%.security\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='user!posix_acl_access\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)=',\x00']) 14:11:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005510000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000002c0)={0x3f, 0x6, 0x4, 0x2000, 0x40, {0x77359400}, {0x0, 0x8, 0x1, 0x5, 0x4f, 0x3, "88e2f618"}, 0x4, 0x4, @offset=0x1f, 0x5, 0x0, 0xffffffffffffffff}) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000340)={0x8e, 0x42fc, 0x9, 0x118f3d8b}) r2 = socket(0x10, 0x803, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000240)={0x0, r3, 0x80}) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:20 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005520000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:21 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESOCT=r2, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRESDEC, @ANYBLOB="626f9baedc497a4372844a48cd9e37960681cb010d"], @ANYPTR, @ANYRESOCT=r1], @ANYRESHEX, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYPTR64, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRESOCT=r3, @ANYRESDEC=r4], @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC=0x0]], @ANYRESOCT, @ANYRESOCT], 0xa}}, 0x20004110) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:21 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005530000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 857.189290][ T26] kauditd_printk_skb: 23 callbacks suppressed [ 857.189394][ T26] audit: type=1804 audit(1580739081.483:937): pid=7560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/354/bus" dev="sda1" ino=17089 res=1 [ 857.554823][ T26] audit: type=1804 audit(1580739081.843:938): pid=7460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/640/bus" dev="sda1" ino=16945 res=1 [ 857.610263][ T26] audit: type=1804 audit(1580739081.903:939): pid=7460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/640/bus" dev="sda1" ino=16945 res=1 14:11:22 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2700, 0x8000) 14:11:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000140)=0x8) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:22 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005540000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:22 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) lsetxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000080)=']wlan1,\x00', 0x8, 0x2) fallocate(r2, 0x8, 0x0, 0x8000) [ 857.662339][ T26] audit: type=1804 audit(1580739081.923:940): pid=7665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/640/bus" dev="sda1" ino=16945 res=1 14:11:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005550000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 857.829621][ T26] audit: type=1804 audit(1580739082.123:941): pid=7674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/355/bus" dev="sda1" ino=17329 res=1 14:11:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 857.982587][ T26] audit: type=1804 audit(1580739082.223:942): pid=7678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/641/bus" dev="sda1" ino=17137 res=1 14:11:22 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:22 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005560000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 858.153997][ T26] audit: type=1804 audit(1580739082.313:943): pid=7751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/641/bus" dev="sda1" ino=17137 res=1 [ 858.418231][ T7799] __nla_validate_parse: 17 callbacks suppressed [ 858.418246][ T7799] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 858.462149][ T26] audit: type=1804 audit(1580739082.753:944): pid=7801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/356/bus" dev="sda1" ino=17297 res=1 [ 858.745898][ T26] audit: type=1804 audit(1580739083.033:945): pid=7751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/641/bus" dev="sda1" ino=17137 res=1 14:11:23 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2800, 0x8000) 14:11:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005700000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005570000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 858.781145][ T26] audit: type=1804 audit(1580739083.073:946): pid=7678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/641/bus" dev="sda1" ino=17137 res=1 14:11:23 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:23 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000040)={0x4, &(0x7f0000000000), 0x8, r0, 0x4}) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x180, r3, 0x2, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x94, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeee8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x29cb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffff}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe15}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xacf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb0c}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18a3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0xc401}, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r4, 0x8, 0x0, 0x8000) 14:11:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="80008ddd43d40c38813caaaaaa000000451a5934f905efaaeb49e4c4516f37538eac8130c722e5f579c6a675310294d613126feb1767b091c522da2fb97d57b7cec0efd9ce39b6f7068dfd285fd2b96b8ffc72f24043f3abaa3fcc2bc933be70847847a17e6a22f6b01d8073adf835ac20e3c856b9b7851536fc83d073c07f421ae9c244a236d9ffd3dd182e1ce431c6e96919ac8c88fb04745a75c78e2ff73409f204333d2cc1c25c498a24a548d2a6539ae9b33a10a936f139e30ca62a9ec4868d"], 0x28}}, 0x0) [ 858.956525][ T7917] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 858.978997][ T7918] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 858.996077][ T7913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 858.996673][ T7921] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005710000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:23 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2900, 0x8000) 14:11:23 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005580000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:23 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x1c8) ftruncate(r0, 0x800) r1 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) lseek(r1, 0x0, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400102, 0x0) signalfd4(r2, &(0x7f0000000080)={[0x1]}, 0x8, 0xc0800) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) creat(&(0x7f0000000340)='./bus\x00', 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fallocate(r4, 0x8, 0x0, 0x0) 14:11:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0x10, 0x2, 0x14) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x1a6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x7d, &(0x7f0000000040)={r7}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={r7, 0x7, 0x2, [0x7, 0x0]}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000440)={r8, @in6={{0xa, 0x4e20, 0x5eb3, @mcast1, 0x10001}}}, 0x84) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r1, @ANYRES16=r3], @ANYBLOB="824b804ee297bbc8278cb745e627acb1d0ef11ef9720edbee0ba31fc2311fa", @ANYBLOB="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", @ANYRES32=0x0, @ANYPTR64], 0x5}, 0x1, 0x0, 0x0, 0x8044}, 0x4000000) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="93a51e0c14e645680cf7000000000a0002c91670a8c4b73f946db63f949930933800aad454aaaa000000d1996c0a45f40da485ca234945484e5c642ab9116451e203a3fde4cd2d45052263900a2a3386b1b8a944c2"], 0x28}}, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080)=0x5, 0x4) [ 859.312777][ T8053] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005720000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 859.391079][ T8068] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 859.394291][ T8065] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:11:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005590000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) rt_sigreturn() r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:23 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 859.620110][ T8187] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 859.654777][ T8190] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:24 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) connect$can_bcm(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = syz_open_dev$vcsn(0x0, 0x81, 0x2) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000180)=0x1109124, 0x4) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r4, 0x8, 0x0, 0x8000) 14:11:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005730000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:24 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) 14:11:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:24 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) r2 = getpid() ptrace(0x10, r2) r3 = getpgrp(r2) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x4, 0x6, 0x7, r3}) lseek(r0, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r5, 0x8, 0x0, 0x8000) 14:11:24 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2a00, 0x8000) 14:11:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005740000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005750000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x208502, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:25 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x111002) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x101, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYRESHEX=r4, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x5}}, 0x20040000) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005760000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005770000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r4, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r5 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r6 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r6, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r7 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r7, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYPTR64=&(0x7f0000000980)=ANY=[@ANYRES64=r2, @ANYRESDEC=r3, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="bd7c9a00f63e566a09e9fb975f806f72f53c2ffac75a08fa904a418e4d07e4b30e6b11bf13ed43b6d2053a7208e93ccb6226d810470d226a7daf7d497daf77fce744db39bf8b41c838ed4e0ba61aac733ad0ea4cfdca6a63fdc03453406091594da4ac0a45b3e8b0b7a0423b302c1923239303db01ab3660d7f2e6dd25bb0f60d5c9ec5135a355f66f0f6f707e166fd4bd48a02fbd4a72e653b7f44c4050fbba5b1f169b01", @ANYRESHEX=r4, @ANYRES64=r5, @ANYRESOCT=r6, @ANYRES16, @ANYPTR64, @ANYPTR, @ANYPTR, @ANYRESDEC=r7], @ANYRESHEX=r0], @ANYBLOB="0000b20000000000"], 0x5}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$midi(&(0x7f0000000800)='/dev/midi#\x00', 0x0, 0x680) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000a000200aaaa00aaaa0000802618fe5bc6ea6378db212af77bf35019515f766684bcddc4b75898000d00"/55], 0x28}}, 0x0) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400040, 0x0) writev(r9, &(0x7f0000000780)=[{&(0x7f00000002c0)="4319e11cd050ce00f15e3ab1affb6aacd6f1712920c9bc84e9803373701c6b3c154b1e8077a11170e68a5c9baa488323364a8fd9e1633e02bd05b1bc31593be2d6f595864908605e1b7a9db7d856ad205c4610053195c79d23513d460700d93824895e15a03414df3e77ee776a14d6b22e50f02b497b42b4e020d5270e6b11b474463c87d77fba6caf8eec7f7acce7cf4e3146b1f00bdb90697ae4a4aedc9ad0bf4417f3ec7ad2e05bf03950a8e659b3cd536d3138a179f83a807249b16b8e753a55fdbfa082644b1428", 0xca}, {&(0x7f00000003c0)="568801ad06cdbcda797200ec2fdf0416e76b4d68f35c03f601ac1a3de75d1e5f4c748d4622076061979c83e1425272c1f54f3a1768576ea7c00908daeb53b5ae9aa394accdc6cf01ac62fa79b71ca9b971774054b0d34cfb4a4343161f53f39f42860884d320ac8dd7cedf5bf0b71b8b8242b1fd1186dc55c27460c462d771e662d3b36901d56041d3f2cbf02925da145df692a3c5760a3f447f9d89ef44ab90b2e95571e8b5088464a612980865ffe9688a535c9ebd87e163ba058a85ba96022996d4ea5a4a04b4fcef0c39cd", 0xcd}, {&(0x7f00000004c0)="8fdc0f81de9137b88187f5fa6a5aa073ff40d063dd8bd13876375404721734d5b0dea403dddac23414d4bcc363ce0002c06414b25a678074f41d03e01b2511a6181774f5a8b6cc4d18678605906f9b44e71e58f78d03c26f42190fe51b0d324f46c5316845b4f3f0355c31a02555bd95cfb3b5e1bf7af5524095134ce1cb9fe4e2695db6b44a900f814a8494cc5b4449d598b110bd8a07e95217bdfa4c49e625c2eaba5032c90bd2a541fe5a3f3ec7a602fe286c32947bca55688c128d674dfae92d17cc4a1ea6b10fd4e3292bdbd4d57f09cc8414", 0xd5}, {&(0x7f00000005c0)="fcc9691dbc62b5c8fbeffea090682daa95d48d9cf4a40f476d8bc09eec789feb2065770a3c41ecf03e0c6dca80e0940c145b0a86d684e73482b0395592e3c3cd7f1fab4637b161a04c376559c2f22c064d5575ccf3ea8248ab620cf4f408243e76c8b5dc998add6c1474d95aefe23eff2f61cd91cd9b9fdd8de765a63b59a6d728a9d000e9351e78dfb8de9d0e81ef3d412275ff1f6bb619a8fa9385d576ed95692d96b1136f06292344ee0adf7f1b77b78ba93c24a998f56ce3166383712409828137b473d1722bb52200a46cc08108956d54", 0xd3}, {&(0x7f00000006c0)="a8339a4f31dd57932aa26f292341acb1ffbdf63c1690c4a13c3cd45d4378654216e79e7edae4931a1f53140a4e9a45d594464cbf5d7d5761e9e1163fdf8971b002f84e0473d2c13cf6057875307e54102f928a1e88d224c8ce615f8129dae2ae274ec4f1756e9fe02268ff", 0x6b}, {&(0x7f0000000740)="abb199442a1554fecc9c23084d1da99a8be3411489a1a84d0eca7690ad5fee7e31f2d4ead3febfabb27cea87f87b533a97308c", 0x33}], 0x6) write$USERIO_CMD_SET_PORT_TYPE(r9, &(0x7f0000000240)={0x1, 0x5}, 0x2) 14:11:25 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2b00, 0x8000) 14:11:25 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:25 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x5, @remote, 0x1}, @in6={0xa, 0x4e22, 0x4000004f, @mcast2, 0x7}], 0x38) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r3 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7}, 0x7) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000040)={0x8, 0x0, [{0x29e, 0x4, 0x0, 0x0, @adapter={0x1bd, 0x80000001, 0x9, 0x0, 0x9}}, {0x80, 0x3, 0x0, 0x0, @msi={0x0, 0x5, 0xb9, 0x1}}, {0x10000, 0x3, 0x0, 0x0, @irqchip={0x914, 0x6}}, {0x9, 0x3, 0x0, 0x0, @irqchip={0x10001, 0x1}}, {0x3f, 0x3, 0x0, 0x0, @irqchip={0xb4, 0x10000}}, {0x6, 0x3, 0x0, 0x0, @msi={0x400, 0x8, 0x1, 0x9}}, {0x9, 0x3, 0x0, 0x0, @adapter={0x7cb, 0x9, 0x5, 0x47, 0x8001}}, {0x8e, 0x3, 0x0, 0x0, @sint={0x1, 0x362d0d}}]}) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000055f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005780000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005790000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005600000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:26 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:26 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffff8) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="71f0ffffffffffffff000000000000000600000000000000", @ANYRES32=r2, @ANYBLOB="000000201e4b915aa745f300", @ANYRES32=r0, @ANYBLOB="00000000290400"/28, @ANYRES32=r0, @ANYBLOB="000000000400"/28, @ANYRES32=r3, @ANYBLOB="000000000100"/28, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00 \x00'/28, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x007\x00'/28]) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xcc, r6, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8a}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="db130407d1f748fdfca1286c8b38152e"}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xecc}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x200}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0xcc}, 0x1, 0x0, 0x0, 0x44080}, 0x4) lseek(r0, 0x0, 0x2) socket$l2tp6(0xa, 0x2, 0x73) r7 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) r8 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r8, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000180)={0x8, 'macvtap0\x00', {'caif0\x00'}, 0x9722}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r9 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000240)={0x980000, 0x630c0f3f, 0xb6d, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x990a96, 0x2, [], @p_u8=&(0x7f00000001c0)}}) connect$nfc_llcp(r10, &(0x7f0000000280)={0x27, 0x1, 0x0, 0x1, 0x20, 0x7, "e4e20ad07cb09c6d20ecbd55ad46cf70f508e91effae6dc504c8898fe2b7520de8d739cf4b2b6e101c49aa3207587ec8137eefd650e96302930f284a20a903", 0x20}, 0x60) fallocate(r9, 0x8, 0x0, 0x8000) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) 14:11:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000057a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005610000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000057b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 862.215641][ T26] kauditd_printk_skb: 23 callbacks suppressed [ 862.215663][ T26] audit: type=1804 audit(1580739086.503:970): pid=8698 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/363/bus" dev="sda1" ino=17486 res=1 [ 862.596250][ T26] audit: type=1804 audit(1580739086.883:971): pid=8663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/645/bus" dev="sda1" ino=17492 res=1 [ 862.678960][ T26] audit: type=1804 audit(1580739086.973:972): pid=8810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/645/bus" dev="sda1" ino=17492 res=1 14:11:27 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2c00, 0x8000) 14:11:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005620000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)={0x2459, 0x8, 0x1, 0x0, 0x0, [{{}, 0x1}]}) sendfile(r1, r2, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) 14:11:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000057c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 862.739799][ T26] audit: type=1804 audit(1580739087.003:973): pid=8811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/645/bus" dev="sda1" ino=17492 res=1 14:11:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r2, &(0x7f0000000340)={0x7}, 0x7) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x20, r4, 0x10, 0x0, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8b29ba74f3c49941}, 0x4044) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000004c0)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r4, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48004}, 0x4000080) r5 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r5, &(0x7f0000000340)={0x7}, 0x7) ioctl$SOUND_MIXER_WRITE_RECSRC(r5, 0xc0044dff, &(0x7f0000000080)=0x4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r7, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r8 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, 0xb, 0x6, 0x701, 0x0, 0x0, {0x8, 0x0, 0x1}, [@IPSET_ATTR_DATA={0x40, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1000}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xfffffffa}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x3}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}, @IPSET_ATTR_CIDR2={0x5}, @IPSET_ATTR_ETHER={0xa, 0x11, @random="00ce519705d6"}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x30000020) write$P9_RWSTAT(r8, &(0x7f0000000340)={0x7}, 0x7) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x14, 0x4, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0xe}}, 0x14}, 0x1, 0x0, 0x0, 0x20040081}, 0x8005) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="4800000010000507000000009006000000000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="0000b2bcf20d11d1c10000030000"], 0x5}}, 0x8000800) getpid() r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r10, 0x4, 0x800, &(0x7f00000002c0)="e30792f152fa925067d76445d06fb98d14033a02023f29875589d7de30ad3ed6dc7c363081003ff04ce92018c1dbedaf1dea9361886bcd203da0976920f64d2455937524a9ed2057744c4b4eedbac3547b2c30395d5b598efdaa97e92f1c56f0c2ece115ce1fafce552d2abda96ec94e7b85361dd8d798d31b510884851f1f311abd92fdc7ede0250d6a903eed9a8cd51b7eac9769a5d805b15a9767b915428aaa4f913db58e2957bacc3e2442a08d70ec5727e682550b2695bf8f11972309e103534e88e02f4753a46c33bd53db", 0xce) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:11:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005630000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 862.863359][ T26] audit: type=1804 audit(1580739087.153:974): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/364/bus" dev="sda1" ino=17505 res=1 14:11:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000057d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 862.974180][ T26] audit: type=1804 audit(1580739087.263:975): pid=8824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/646/bus" dev="sda1" ino=17512 res=1 14:11:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x140}, 0x40014) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) r4 = syz_open_dev$vcsn(0x0, 0xffffffff, 0x2c2) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000140)=0xc, 0x4) 14:11:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 863.151918][ T26] audit: type=1804 audit(1580739087.433:976): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/646/bus" dev="sda1" ino=17512 res=1 14:11:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005640000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:27 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000000)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00', 0x92, 0x8, 0x9, 0x10001, 0x5f90, 0x4, "028378b6ede033a59e59c6d9da6bd6f22df9696893cf02fe2ca29f89383cb24fa0c9d59892ba07bb9d9543d33fea0f0c99bc6e32c62520222e0ad1c1a02753c73767953214bc07ec31baefac7bf648b0732abe3014b0b5b2fd86731c4e6de2f5d9b59b0dd545d30b8774f60645479515622c87b4b5da9fb80c236562ba9e7afb6b30587bba0ff95ce56d71e7725e382cda1e"}}, 0x1aa) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) [ 863.472959][ T26] audit: type=1804 audit(1580739087.763:977): pid=8947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/365/bus" dev="sda1" ino=17505 res=1 [ 863.836782][ T26] audit: type=1804 audit(1580739088.123:978): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/646/bus" dev="sda1" ino=17512 res=1 [ 863.896698][ T26] audit: type=1804 audit(1580739088.183:979): pid=8824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/646/bus" dev="sda1" ino=17512 res=1 14:11:28 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2d00, 0x8000) 14:11:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000057e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005650000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:28 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:28 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000200)=""/135, 0x87, 0x10000, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = syz_open_dev$vcsn(0x0, 0x94, 0x30002) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000100)) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r3, &(0x7f0000000000), 0x0, 0x8c0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0xfd9c}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x39) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) socket$inet6(0x10, 0x2, 0x14) r5 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) r6 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r6, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000400)={0x4, &(0x7f00000003c0)=[{0x8, 0x4, 0x77, 0x6}, {0x5, 0x5, 0x4, 0x400}, {0x19, 0x4, 0x92, 0xfffffffa}, {0x9, 0x8, 0x4, 0x7}]}, 0x10) sendto$inet6(r5, &(0x7f0000000000)="8e", 0x62, 0x0, 0x0, 0x46) socket$inet6_sctp(0xa, 0x10000000005, 0x84) [ 864.075109][ T9062] __nla_validate_parse: 21 callbacks suppressed [ 864.075182][ T9062] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 864.098984][ T9063] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005660000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005820000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:28 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 864.328668][ T9171] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 864.393553][ T9172] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005670000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005830000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:28 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) execveat(r1, &(0x7f0000000000)='./bus\x00', &(0x7f0000000200)=[&(0x7f0000000040)='self\x00', &(0x7f0000000080)='\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000880)=']^}vboxnet1self\x00', &(0x7f0000000140)='\xad\x9d\xcf@\x0e\x8f\x82,\b\x00', &(0x7f0000000700)='\xa5U\x84\xeb\xfe\xd4yl\xe6i0E1\xde\xf8\xf1\xca\x93\xe5\x15]\xcb_z94\xe1\x1d@\x90\x8c{\x82\x8a\x89\"\r\xae\xb45\x80fm\"\xd3\xce\x15R/\xc1\xc7\x1e?_t\xda_5\xeb\xb8\be\vMr\x04\x15\xaa>\xc1\xc2\x85\xe4\xfe\x9bY\xfa=y\x03\x8f\x10\xc7\xc5%+7\x89\xb5\x7f{\x83x\a\xa8\xb8-A\xca\x96\x0eD\xb8\xa0E\xc2\xc0\xd8\x9cW\x93\xd7c=\xe81\xb6\xed\x95\r\xde$\x8d\x9d\xbe\xdd\xa9\x10\xd8\b\xd57a\xf4\xa35\xe4=\x93\x18\xf6\xfa{\xaa\x17\xfe\x10\xfc8\xe1\xbc1R\xc8\x94H\xacy\xa3!\xb1<\xfe\x93q\x04\x1c\xbf\x01\x81\xca\b\xd4!2#\x19\x9b\x01\xe8\xca\xaaT!\xde\xb5:Ki\xa4\x1fj\xde3\x15', &(0x7f00000001c0)='*\x00'], &(0x7f0000000500)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f0000000800)='p\xd4\xabV,p\xbdHro\x00\x00roc#syst\x06T.\xdayP\x80\x9d\x80\xfc\xaa\xe9\x8e{\x929\xfa\x13\xe6\x9c\xb0\x87\xc4W\xc7\xda\xa8\x93M\xecU\xc0\xef\x8aaI\xb4\xe6\xe4GE\x12;\n\x96\x0e\xfe\xdc&\x80 -2\x81\xec>\v\xf9.$\xe9\xb7X;/\t\x18$\xb6\nc\xfaT\xbe\xae=\x0f\xc7w\x85T\xe3\xb6\xad\v~^\xbb\x8f\xa0Z\xe6\x05\\1\xf8', &(0x7f0000000300)='[\x00', &(0x7f0000000380)='cpusetprocsystem\x00', &(0x7f00000003c0)='vmnet1\x00', &(0x7f0000000400)='em0wlan0trustedem1][\x00', &(0x7f0000000440)='/)-\x00', &(0x7f0000000480)='vmnet0md5sum\x00', &(0x7f00000004c0)='\x00'], 0x0) write$apparmor_current(r0, &(0x7f0000000580)=@hat={'changehat ', 0x4, 0x5e, ['ppp0systemtrusted\x00', '\xa5\x00', 'procproc#system\x00', '{lo\x00', 'ppp1/ppp0&\x00']}, 0x50) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0xc0400, 0x0) epoll_wait(r3, &(0x7f00000006c0)=[{}, {}, {}], 0x3, 0x20000000) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r4, 0x8, 0x4, 0x1f) r5 = msgget$private(0x0, 0x21f) msgctl$IPC_INFO(r5, 0x3, &(0x7f0000000600)=""/41) 14:11:29 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 864.721745][ T9183] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 864.769065][ T9184] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 14:11:29 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2e00, 0x8000) 14:11:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005680000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:29 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005840000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:29 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 865.321649][ T9300] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 865.338472][ T9299] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005690000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005850000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:29 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)={0x80, 0x5, 0x9f8, 0x80000000, 0x2, 0x7ff}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) 14:11:29 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 865.682198][ T9412] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 865.698937][ T9411] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005860000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:30 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x2f00, 0x8000) 14:11:30 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0xc5) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x40102, 0xc1) r2 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffff6) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000000c0)={'bridge_slave_1\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}}) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x100010, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x10082) write$P9_RWSTAT(r4, &(0x7f0000000340)={0x7}, 0x7) open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x0, 0x56, 0x39, &(0x7f0000000100)="a503e63a3512ac11dd76c06ea8e788670cf423bd47a0f9a5442797b2cc3957e5b6a8d5180dfc279d3d843d1f91d4ba5b67dd6f504c34bdb08b9ba9f37034d68ee4c32d8e48898d50ff4cc22590b2548ec75357e26a1a", &(0x7f0000000180)=""/57, 0x0, 0x0, 0x1000, 0xac, &(0x7f00000006c0)="ff226cfd50f24d0edd02d807c59756d48bcefd618412c7d8a927e091ebcac6caf28222aee7e4313ebb62e41789c975bf4de80e894276f7865bcda9a456e21c0d5bf3dee34d99c5fab7db4764786a20218e0add01fe0ec0b0ea64c6ca7fc78a69711f712ffd6b291c6d38262bfeb9c3266aaab613b4832fce3f087e2f4fcb7198f7fe6ef2ae2c39ef2ea7c5135276baf968f6c4c953ec090d15e47db33bd9f4dedb488a133c4e994d8171317a1a6ce6a4ca964443029832a4202a97a8cb41f229e37491628b4c1f0d89526177135b5e2e25e6459166354516bb5c1f70840477b791fc132007f0a6ac03e81207ef724766382036660a496782dd7b1397b009258594b27f8c05a002505223bbafe22d318bd3fb260c933d11e8822838e913eaa32cba188fcdc666185eedefd56e86aedf4906e78e6806bac0f587d3c372580fe8eea4e7bc10370d3c7a302340eba8dee10a3dc545d4be09d7870ab7e2c87d6785c2525da5ffe8e5134a1a3e51a9478cfbf8cd99523fc45d60284b6138e17c46601584a5ad9f0f67480808a783f7774f43c1f1969bf62bc226fb760ff870663c0bebe10e8fa452ae4d08ba2602423b17de43152da0bf6bb2a288812986fb1179a147a71e81368ac8e57e90c43432b1a7c3ebea0a81ad5126304d2145d5edc2d1ba9dca13c48818dee0b6152606c86d1f1a89f8c5210226e3e7bc58d5b291fafec9ec691f5a6c79b65b44f89deabb7f3871327ab870c62dff454777e9d688e83913e733a8133309bbda4f6cbf47c9bece450a0a2968db018317a3fa97e245a25c3dc30c3475d6f2940bc0424af95425ac9eaf42fcc9262b3a697595d6d09b14b3abe12ca9c296c70c18b48ae2bfa860d43c119150bf2a11afbebd72fbd03c740d56ee7bef473a23f69b1b8a2f79c1aaf106aefe922ff01506eda3d5b24cdad9945c9eb5cf7ae990f1bcded6bd7471da875d9af5be0f8eb2125f376c81f0810ac5805062865c9e2b94ce10c0a85585b4d4a00bf15e3236baba9625870ff483fe233fbbea58fd30da8b155ff5e75828637ccb22948fdd187422ecf69a93d941a161fdf5d182d95d50c031692d894fccfee1a29383ae625d04ac5b7b6f8f45b5fd716255a70b1afc124c0ccf9ad861e9e3466839ce793a79684ed296ab8c2fcbce3585d7061d4970cca7301a8c0d9fd2b8eac275e3439a7f205916e83b56e1a95e4a323262c189cfc72e8abc995185b2c9463f7edc52b556d4d9f49addc3ccd3920301f62a201d8691290eacac486956eb53575dd509584ef5e4ec22ef4da2d1d192e0aa95baa366fd51801ec7169df4b9bb9e9a64fba439f36879c695b986f1d86049b0f89bbef773c65d7976be2b380d05be4de9b5c621fb8bbc1a71f889d1cb14ea24b19ffe419d02c29ecd0b076bd241e43151864f28f201868c6fed57be656f68ac3023332fc6c12aa71c9cd514597fa5122372424410f348b392b4846046a0294ab205e5ed25ea2aec40a4c1f75dc15d4c6028b86c22439a2e1470c623bb9ee4324c920152584904e7bdb2549debe9be7e9d27207054b46488ef3e9f99d081d62c953eaf14367b9e0f86261260e1cf7cacebd388b6ce0d7502a570da6decdc2d7326f086be11af28615a248c8aa1d80d0b2093fc1f0aa8cd08448f8d0cb3281664924adf4ae300a42e6ce8a2c77e6f4122a75fe1cea167c716f597b2b2a8649dcb4327926b450b1d04a95561e7c61472db00b8c6cfa73284d07546fa9f4564f4393d30efe91897a7474aeaba33c3d1c3e9b7e08f13488ba6985019e5e0ff2fe09900cc6fdf1aaedf5d49e35e3246c3095e6b40b1e64226f897280d1edfdad9d0079980116dd9de03095be7393935e6ac1ba9e43b9fa7bb0fb2fb3427c01a9c7c48a55d5892f838a38f166d992aa086c078c129ab757444409f7b96f4f6fee8de900076857131851d91113e0b9d7b73145adbf89cb3c092f70d9eccdb0fd2442423b705cf9b02dbdc10db0759bdb45416fbed606aef0de345d3ed89f05bc027af14296a03c8c73ac25916e36246f6769efaa72ccaffa3f9e9e0844e910012b0a2a4e3302ea8fc2b2361677a497bf8e8e2791ef87d66443aa5fac77628f4eac70b9cfc1e3e58f8b5de3118de9de6f39dc2c943957fe4cd04ba9694ecbc8bc5a37c58a35a478c64c9a96eaeed0d9f9c9dc94595a505634793757517d0d53793907301fa293825ada09f6f5554452be59927b9bd5fa10df996f97502e4b9054e1f0b5dbaa725d9a26a5adcbd039ffa02ffcdcecff4864a937ec4127d6e2bfe990933f19cf45972379feb5c3c50ab4d76a4fb010343bb95647a38b045969f513da5bec65fc0e5c19dea7e37b260c338d03090844c7072f2df9d0af180a12a155c9886628eeeb3c23811cb02864227db447fa54c3c4ada577c2bc3b298b57d33c8cda333395640017b4209700696af73cf8e5c8d776ce6fdb5722ec9d142e83558265b086aa4b78f156c9cff1e5401caccf8d32b2ff83d4900c5be22c0a6ea500f0a01541422df62e57233277f36b43afb07c523b88528e8f42cdf9e05619fb60339680d6c27104a6e65981fcb78b79b4c066b74b9c1f8df57317014b650f48b90d9d365eaac49baa5a0dd4360bc187cd71108c23e4aba6e644903aaf6a3e49f2ae399ce9a3ed4a0f973dc0ef6dba172c2a2679e324edb9c982f36146a5a30862746ac958114b19574688394977fd0d438e9c068ab9a608d7dad9c7a6cda21ded54d7935e2a4026a2b832d205e19cccb9c1d11478c3a64280678b146997b3825c3230fa6c3c2bb0cdd99bcd5f1a353f8a7dd277e2cd50901937250a83ce2a682b7f4b214934708e8d8918209d02bff9c896e224969d493c4735a4089890eafc1f17c0dfc9533c00583c31fd50522ece1c7ad04a881de22835cce52b8751136c6eb9daba954e72d2514178e47194fdc989ee6b38605ea8d5585135f5f95f46ca16257a26792f719f195366288f35336e72852a316fb699016be5f3771301c48dd1f546aac1d85d61f370eb7b2980342803df4282e739fa11c346ee8f3decb13340236a461c86a74883c379f8b69b086161f4f0069f52321aa2b6edd857951851ef443477b0fd07402f8d88a5a7d0cd423dda31b482a68ef96e9ef96aa8f8a1865d4cf0ead3ce6ac9bc7f2d5ed9745c8afcabe2512e97f5820861649026b91f5909e65a3863e1197a7eb11aa0209001b77b24879fe840539e786e28303aafb405c350fd1b1381c96ccd63f5dc7ccb0eaf44196c94947708a3d304776b78b8356b4ae6ae13efec1df9dc6653f584f25840655482a23163ae4e39742e15f89018434befaef1d2bbd79a2c221137eb396be399a3683d260d0401ab75459232edea445f229a6b739dbcc7589f286b6a8e45743e5e5782231456ecb4c16acbc1338ba46baa501945584ea1081cc8db36c95665f3b6daa5d23c04acbbaac4c55db5d3b16f0f3b5eb153edec74b08b13d4291cd5c2ffd0685c5ca3ed84cfb8380fd61abff067671b587fe08e809c6fe8c8630fcda083b6d41fc178244cbfd063f47c7cbf0f57654a7279b14cd8809aae1813b652d7a5ece4e219f9f1455888c17dc2adef1c42b7e5ba38770656bb303e11c77c6dc7946575deb9c459d458785f74205d6ad17513d8c0c027c68d7ed1c675bde7cfd91d5e80d1308c37310160d7b3bf5a73cfb075cbd6a1e23bc751a4bb18b899e0ea3e04358f2bf82ecfd02aa9d8d6357b0b5a733190620d6c4ded72a5e461bbf6bf3f6d127955b5f2844dbaafcc8dfaa43e1918fcc095f6a83e3da5ec60befd0582c6e2c077fe3d96f24e02c23a7d937c9b7ded53d553cb2e0021d3440a9124564689309b054a5559c26837ae25a8a6fedb19aa9230b9cea76e603ad1b8340e2e9f42fa5e555291a3d57f1b9dc579965fe10ad9d35ab70a0be7c6b8970efcddeeb40f6df49cb49463f3b668f2332075a5a71c2dade1f95a298eddfe30923b14dbc94e073a8c4921d5a55015d926b35dc9bab87f4944397380c8f1b741d3c0bb4a06c3c64270c6423027e21f087f8506f1a63355c271faab0ae84ba19167b566d59847406e1c3a406a99ff81df6adcbe5d31e74917b75888c582b5bc9774d775799477ef07a89905d070b548fb5e29ccf6ed6d435d0e975f9258d8334f9214ce6ff8b0bb4a506ee4202c6c43ae7c790248f531b8b58c5f8859b90375fe0b96612d1ff3bb0350e965769355b40621e4d57378d0f4b428b211bde8fad3923c6b1cd54d329bddb697a67368c93c0c0543e869c8ff6c3fb6a3f399b09e5a52671bef9a06bbb0ac0f6f63c5b6ac9c065cd2be3cedef5e1f487a9109248eda4d1b500638a577848a0a85e6eee93705fe06bcfb154330696fba7cc7b2620538de3c26710e5d619c8f0abc6dc0409965bbce507fcaa16c0e38bc22032ab0c290272c35e7eea7931847ec6bfbf053711d1f5405a47328502d0aa683409715ca2d93a6d73a85e1975d17d18ba25d1e0b1520b7c23256eea840bfc7d06f934f428bcea935e996144bfe248d8ace8093c9bfe6fefc889e107e8c91fc429aab71c1276c570669ec86f97747d1747e5839e3bd4ec431116c7783254b656e45b354060ba867dddb94a2e5f37e19eea495fb93aa9020271f5aee662f6c73bd3fe4b11ea59ccb02597b20abbfe43de44ae5d7c36084cffa887b17e41f860fda8d73e789f096a77138f4c62e8a6369add453615c3cffe5b24ee1424019c543c93d455f1418be3204db8a583d8eceb24c10ad218da2fe57d27652192744f74614c84597093064a89c3f33ca1f50aaed409606d129b4d35791db9efac530fa4146957ace41a1bf5a68e16dc12f9ab943d858e5e72ba34446f4a0e54e60e09151551c6b5ec54cf8e1731c492ab4eab1761a0097755e5b0b43a0278fc97a0e602f3885b6dc355b17ac65c210e560ec98dc4cad349b0390923915639bc3c0112e906a3a011de68b222649baa5d4668adde47b3eb6789cf159c224d4c901f633020569810d7e3ee33ca4ee97180ba9b08fcb57ed6c40f4bd2215cd5b4eace9614c43b64e03e95db16c2b2117987ec2f7606f754110c99b80227b8ce4b1d5cad2b3257b5bbd5e44fe696b02979c13ee1dd05cea4ca61e9b202e021a7ea479c47d3562a5d5d14b8bd00a1a377c8d1dc9d35456b9da7ef2230f8d4766d92d13282ea9157e59ba85bb66d0236dda81067f4f3b8028257eb1c43fb86c458e249e2a8f45261b8acafb2009ef7ac8030e56daffeb5dbf256d04c4710b49613dbda538eda6e37934b15a158577313b8ecf12d1c1eadc1b28d937e954af2d50e8fa71126b932c1ce3c2fec8973779739b453320e7e2ba42c7580c331742f46890a95e251652ae441e8e08f45baa8fabcaf904f02ac08cd3fa14c72e25e2393d8ca796984bacc265f36f2d786114387fb9d238142142c0b21e77e796ac85ad3c9d9f2ba41e6cdeb5289526c533f80057119797d938ec91ca115750f8d51e907a5d85f2434a818d9ccefdb4c427eb305b85af4039b8ab19ad8bbda4ac00a00492b284613d5fe33ee42db1f8e2c9a6fe706baf4b9d8b9846f9d1cb06c2bb5c92624f2cc110348304bd7d8492ca8261cd47dfd6522ce9318146b8bc589e1e51b1e12a1c35abd235f02604bc66452929a78894f7cd05d3daf7798015eb1ee8ed191cca899443dc03316195f72ad998af180ebeaa1a0bcbaf6b7502daeea20cee3c2a68e9b613b23947d6be162d492c08b600a1cb5e38d68c7caeeb93ec53ffaf5ab72b9463035049f", &(0x7f00000001c0)="65a1245d2480b4e6208832117e97f9a9e62be0aaa299c1b7da25942c1acfab33c6e72b8d2cf67e261f5a681f2e81d6ba132282f061cd510139ddadb4e4612d78f8644358a0d2792693fa2d315d96af91ff271e64da88b9a3288b185fc6157a1651b56082bd12c3b3157689dbf587004f75d89153523e332316a1e40a103a2a7300ff52c165f29fe630aeee0917d51538c1fb2e8947c3bec59aacf524be76717f43838a828893e7e37d618f02"}, 0x40) r5 = socket$inet6(0x10, 0x800, 0x2) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000640)={0x3, &(0x7f0000000300)=[{0x1, 0x9, 0x81, 0x10000}, {0x2, 0x5, 0x1, 0x2}, {0x3, 0x81, 0x8, 0xffffffff}]}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xfffffffffffffe8b) r6 = syz_open_dev$vcsn(0x0, 0x4, 0x10002) write$P9_RWSTAT(r6, &(0x7f0000000340)={0x7}, 0x7) r7 = openat$cgroup_ro(r6, &(0x7f0000001700)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000004c0)={&(0x7f0000000540)=""/242, 0x1000, 0x800, 0xef2, 0x1}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x40901, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000480)={0x9, [0x3, 0xa0e9, 0x7ff, 0xfffc, 0xfeff, 0x4, 0x7, 0x1f, 0x8]}, 0x16) getsockopt$IPT_SO_GET_REVISION_MATCH(r8, 0x0, 0x42, &(0x7f0000000500)={'ipvs\x00'}, &(0x7f0000000380)=0x1e) fallocate(r3, 0x8, 0x0, 0x8000) 14:11:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005870000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005880000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:31 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000180)={0xc, 0x8}, 0x10) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) socket$can_bcm(0x1d, 0x2, 0x2) fallocate(r2, 0x8, 0x0, 0x8000) 14:11:31 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005890000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000058a0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 867.498876][ T26] kauditd_printk_skb: 18 callbacks suppressed [ 867.498970][ T26] audit: type=1804 audit(1580739091.783:998): pid=9561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/649/bus" dev="sda1" ino=17535 res=1 [ 867.578693][ T26] audit: type=1804 audit(1580739091.863:999): pid=9648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/649/bus" dev="sda1" ino=17535 res=1 [ 867.628837][ T26] audit: type=1804 audit(1580739091.863:1000): pid=9774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/649/bus" dev="sda1" ino=17535 res=1 14:11:32 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x3000, 0x8000) 14:11:32 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x8000) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x6000) ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0x7) 14:11:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056e0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:32 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) 14:11:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000058b0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 867.817056][ T26] audit: type=1804 audit(1580739092.103:1001): pid=9781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/372/bus" dev="sda1" ino=17540 res=1 14:11:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000056f0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) [ 867.886782][ T26] audit: type=1804 audit(1580739092.143:1002): pid=9784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/650/bus" dev="sda1" ino=17601 res=1 14:11:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000058c0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:32 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x3f6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 867.983361][ T26] audit: type=1804 audit(1580739092.203:1003): pid=9845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir268838730/syzkaller.iNKUqq/650/bus" dev="sda1" ino=17601 res=1 14:11:32 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8200, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r1}) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x8000) 14:11:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d616300000000058d0000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d000300686173683a6d61630000000005700000000000000900020073797a30000000000c0007800800064000000000050005000000000005000100070000000611efc21f3208c13ed5011e9180de9d96d3ae022131573b26930d96d3c564c0df55cb880c55200432cbc97018711759b3beffb3d12a299e4af9c75c46d98e902040a4dc370512c931754f453148cdf224b304bafdbd099eb439bbf86470207012a087aefa32a786b8d8b32e5b57"], 0x54}}, 0x0) 14:11:32 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x9, 0x1f0025a7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x3fa, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffce2, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 868.471367][ T26] audit: type=1804 audit(1580739092.763:1004): pid=9898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir164453487/syzkaller.tvNZbk/373/bus" dev="sda1" ino=17010 res=1 [ 868.610455][ T9784] ================================================================== [ 868.618762][ T9784] BUG: KCSAN: data-race in ext4_alloc_da_blocks / ext4_da_reserve_space [ 868.627092][ T9784] [ 868.629574][ T9784] read to 0xffff8880ad17f630 of 4 bytes by task 9780 on cpu 0: [ 868.637283][ T9784] ext4_alloc_da_blocks+0x4b/0x180 [ 868.642430][ T9784] ext4_release_file+0x10d/0x210 [ 868.647383][ T9784] __fput+0x1e1/0x520 [ 868.651384][ T9784] ____fput+0x1f/0x30 [ 868.655385][ T9784] task_work_run+0xf6/0x130 [ 868.659978][ T9784] exit_to_usermode_loop+0x2b4/0x2c0 [ 868.665297][ T9784] do_syscall_64+0x384/0x3a0 [ 868.669931][ T9784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 868.675823][ T9784] [ 868.678166][ T9784] write to 0xffff8880ad17f630 of 4 bytes by task 9784 on cpu 1: [ 868.685831][ T9784] ext4_da_reserve_space+0x13f/0x280 [ 868.691153][ T9784] ext4_da_get_block_prep+0x87f/0xa60 [ 868.696575][ T9784] ext4_block_write_begin+0x33e/0xba0 [ 868.702128][ T9784] ext4_da_write_begin+0x208/0x840 [ 868.707333][ T9784] generic_perform_write+0x136/0x320 [ 868.712653][ T9784] ext4_buffered_write_iter+0x143/0x290 [ 868.718231][ T9784] ext4_file_write_iter+0xf4/0xd40 [ 868.723389][ T9784] do_iter_readv_writev+0x487/0x5b0 [ 868.728627][ T9784] do_iter_write+0x13b/0x3c0 [ 868.733259][ T9784] vfs_iter_write+0x5c/0x80 [ 868.737808][ T9784] iter_file_splice_write+0x530/0x840 [ 868.743345][ T9784] direct_splice_actor+0xa0/0xc0 [ 868.748303][ T9784] splice_direct_to_actor+0x22b/0x540 [ 868.753704][ T9784] do_splice_direct+0x161/0x1e0 [ 868.758574][ T9784] do_sendfile+0x384/0x7f0 [ 868.763015][ T9784] __x64_sys_sendfile64+0x12a/0x140 [ 868.768233][ T9784] do_syscall_64+0xcc/0x3a0 [ 868.772755][ T9784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 868.778649][ T9784] [ 868.781126][ T9784] Reported by Kernel Concurrency Sanitizer on: [ 868.787298][ T9784] CPU: 1 PID: 9784 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 868.796009][ T9784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.806802][ T9784] ================================================================== [ 868.815062][ T9784] Kernel panic - not syncing: panic_on_warn set ... [ 868.821670][ T9784] CPU: 1 PID: 9784 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 868.830267][ T9784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.840367][ T9784] Call Trace: [ 868.843701][ T9784] dump_stack+0x11d/0x181 [ 868.848079][ T9784] panic+0x210/0x640 [ 868.852021][ T9784] ? vprintk_func+0x8d/0x140 [ 868.856656][ T9784] kcsan_report.cold+0xc/0xd [ 868.861287][ T9784] kcsan_setup_watchpoint+0x3fe/0x460 [ 868.866700][ T9784] __tsan_unaligned_write4+0xc7/0x110 [ 868.872119][ T9784] ext4_da_reserve_space+0x13f/0x280 [ 868.877527][ T9784] ext4_da_get_block_prep+0x87f/0xa60 [ 868.883120][ T9784] ? _raw_spin_unlock+0x4b/0x60 [ 868.889938][ T9784] ? create_empty_buffers+0x20c/0x3e0 [ 868.895360][ T9784] ext4_block_write_begin+0x33e/0xba0 [ 868.900777][ T9784] ? ext4_bmap+0x220/0x220 [ 868.905244][ T9784] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 868.911180][ T9784] ext4_da_write_begin+0x208/0x840 [ 868.916452][ T9784] generic_perform_write+0x136/0x320 [ 868.921877][ T9784] ext4_buffered_write_iter+0x143/0x290 [ 868.927455][ T9784] ext4_file_write_iter+0xf4/0xd40 [ 868.932587][ T9784] ? common_file_perm+0x1d5/0x490 [ 868.937642][ T9784] do_iter_readv_writev+0x487/0x5b0 [ 868.942875][ T9784] do_iter_write+0x13b/0x3c0 [ 868.947488][ T9784] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 868.953411][ T9784] vfs_iter_write+0x5c/0x80 [ 868.957953][ T9784] iter_file_splice_write+0x530/0x840 [ 868.963977][ T9784] ? page_cache_pipe_buf_release+0x100/0x100 [ 868.969982][ T9784] direct_splice_actor+0xa0/0xc0 [ 868.975463][ T9784] splice_direct_to_actor+0x22b/0x540 [ 868.980861][ T9784] ? generic_pipe_buf_nosteal+0x20/0x20 [ 868.986439][ T9784] do_splice_direct+0x161/0x1e0 [ 868.991341][ T9784] do_sendfile+0x384/0x7f0 [ 868.996236][ T9784] __x64_sys_sendfile64+0x12a/0x140 [ 869.001469][ T9784] do_syscall_64+0xcc/0x3a0 [ 869.006007][ T9784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 869.011932][ T9784] RIP: 0033:0x45b399 [ 869.015901][ T9784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 869.035715][ T9784] RSP: 002b:00007f65b44f2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 869.044236][ T9784] RAX: ffffffffffffffda RBX: 00007f65b44f36d4 RCX: 000000000045b399 [ 869.052669][ T9784] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 869.060682][ T9784] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 869.068803][ T9784] R10: 00008400fffffffa R11: 0000000000000246 R12: 00000000ffffffff [ 869.076962][ T9784] R13: 00000000000008ca R14: 00000000004ca24d R15: 000000000075bf2c [ 869.087011][ T9784] Kernel Offset: disabled [ 869.091423][ T9784] Rebooting in 86400 seconds..